Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise54 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers72 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems65 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits86 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager70 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction28 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud81 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World69 Questions
Exam 9: Social Media, Peer Production, and Web 2.0104 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology30 Questions
Exam 11: Facebook: Building a Business From the Social Graph88 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 4038 Questions
Exam 13: Understanding Software: a Primer for Managers76 Questions
Exam 14: Software in Flux: Partly Cloudy and Sometimes Free79 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage91 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications79 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and Beyond132 Questions
Select questions type
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
(Short Answer)
4.8/5
(38)
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
(True/False)
4.9/5
(29)
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
(Short Answer)
4.8/5
(35)
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.
(Short Answer)
4.7/5
(37)
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
(Multiple Choice)
4.8/5
(28)
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
(True/False)
4.9/5
(35)
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
(True/False)
4.9/5
(26)
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
(Multiple Choice)
4.9/5
(31)
Which weakness of Web sites to launch attacks does an SQL injection technique exploit?
(Multiple Choice)
4.8/5
(30)
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
(True/False)
4.8/5
(33)
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.
(True/False)
4.8/5
(44)
Which of the following statements holds true for the term encryption?
(Multiple Choice)
4.7/5
(35)
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
(True/False)
4.7/5
(33)
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?
(Multiple Choice)
4.9/5
(36)
What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?
(Multiple Choice)
4.8/5
(39)
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
(Short Answer)
4.8/5
(34)
_____ refers to a trusted third party that provides authentication services in public key encryption schemes.
(Short Answer)
4.7/5
(34)
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.
(Multiple Choice)
4.8/5
(31)
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)