Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise59 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems70 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits94 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager78 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction38 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud93 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World71 Questions
Exam 9: Social Media, Peer Production, and Web 20111 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology43 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph103 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry52 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts84 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage97 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications82 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity137 Questions
Select questions type
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
(Short Answer)
4.8/5
(40)
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
(Short Answer)
4.8/5
(33)
Which of the following statements is consistent with ground realities regarding information security?
(Multiple Choice)
4.9/5
(34)
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
(Multiple Choice)
4.8/5
(36)
Some of the most common guidelines issued by Web sites when designing a secure password include:
(Multiple Choice)
4.9/5
(21)
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:
(Multiple Choice)
4.9/5
(41)
A vast majority of security breaches are not preventable and happen despite the best security practices.
(True/False)
4.8/5
(38)
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
(True/False)
4.9/5
(34)
Which of the following statements holds true for the term spoof?
(Multiple Choice)
4.8/5
(41)
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
(Short Answer)
4.8/5
(36)
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
(Multiple Choice)
4.9/5
(30)
The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification
(Short Answer)
4.8/5
(34)
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
(True/False)
4.8/5
(33)
Viruses are programs that infect other software or files and require:
(Multiple Choice)
4.8/5
(29)
An attack on the US power grid by terrorists or a foreign power is indicative of:
(Multiple Choice)
4.8/5
(36)
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
(Short Answer)
4.9/5
(36)
_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
(Short Answer)
4.7/5
(41)
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?
(Multiple Choice)
4.9/5
(43)
Showing 61 - 80 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)