Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise45 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers70 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits84 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing, Disruptive Innovation, and What This Means for the Manager77 Questions
Exam 6: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud75 Questions
Exam 7: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 8: Social Media, Peer Production, and Web 20119 Questions
Exam 9: Facebook: Building a Business From the Social Graph99 Questions
Exam 10: Understanding Software: a Primer for Managers77 Questions
Exam 11: Software in Flux: Partly Cloudy and Sometimes Free82 Questions
Exam 12: The Data Asset: Databases, Business Intelligence, Big Data, and Competitive Advantage81 Questions
Exam 13: A Managers Guide to the Internet and Telecommunications83 Questions
Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else90 Questions
Exam 15: Google in Three Parts: Search, Online Advertising, and Beyond115 Questions
Select questions type
Updates that plug existing holes in a software are called:
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
Regularly updated software lowers a system's vulnerable attack surface.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
Which of the following statements is consistent with ground realities regarding information security?
Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
D
Which of the following could be one of the ways firms lockdown personnel hardware?
(Multiple Choice)
4.9/5
(31)
The information systems of several firms have been compromised by contract employees,cleaning staff, and temporary staffers.
(True/False)
4.8/5
(26)
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
(True/False)
4.9/5
(39)
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
(True/False)
4.9/5
(37)
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
(True/False)
4.9/5
(34)
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
(Multiple Choice)
4.7/5
(41)
Even the best implemented encryption programs have not been immune to brute-force attacks by hackers.
(True/False)
4.9/5
(37)
One of the reasons organizations delay patches to plug holes in their security applications is:
(Multiple Choice)
4.7/5
(32)
An organization's partner firms that should be regularly audited to ensure that they are compliant with security frameworks include:
(Multiple Choice)
4.9/5
(31)
A vast majority of security breaches are not preventable and happen despite the best security practices.
(True/False)
4.7/5
(31)
In public-key encryption systems, the functions of the public and private keys are interchangeable.
(True/False)
4.8/5
(35)
Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.
(Essay)
4.7/5
(39)
The typical Web user has 6.5 passwords, each of which is used at four sites, on average.
(True/False)
4.9/5
(43)
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?
(Multiple Choice)
4.7/5
(40)
Showing 1 - 20 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)