Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise54 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers72 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems65 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits86 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager70 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction28 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud81 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World69 Questions
Exam 9: Social Media, Peer Production, and Web 2.0104 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology30 Questions
Exam 11: Facebook: Building a Business From the Social Graph88 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 4038 Questions
Exam 13: Understanding Software: a Primer for Managers76 Questions
Exam 14: Software in Flux: Partly Cloudy and Sometimes Free79 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage91 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications79 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and Beyond132 Questions
Select questions type
Describe briefly a few of the physical threats posed by hackers to information security with examples for each.
(Essay)
4.7/5
(36)
A vast majority of security breaches are not preventable and happen despite the best security practices.
(True/False)
4.7/5
(25)
Spear phishing attacks specifically target a given organization or group of users.
(True/False)
4.9/5
(34)
In public-key encryption systems, the functions of the public and private keys are interchangeable.
(True/False)
4.8/5
(43)
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
(Multiple Choice)
4.8/5
(36)
What are some of the key managerial takeaways from the Target security breach?
(Essay)
4.9/5
(38)
The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification
(Short Answer)
4.8/5
(38)
Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.
(Essay)
4.8/5
(29)
Which of the following are considered sources of information that can potentially be used by social engineers?
(Multiple Choice)
4.9/5
(36)
Which of the following is a valid statement on information security?
(Multiple Choice)
4.9/5
(39)
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?
(Multiple Choice)
4.9/5
(38)
One of the reasons organizations delay patches to plug holes in their security applications is:
(Multiple Choice)
4.7/5
(32)
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
(Multiple Choice)
4.7/5
(28)
It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.
(True/False)
4.8/5
(24)
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):
(Multiple Choice)
4.7/5
(33)
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.
(True/False)
4.9/5
(31)
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
(True/False)
4.7/5
(35)
Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:
(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)