Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise45 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers70 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits84 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing, Disruptive Innovation, and What This Means for the Manager77 Questions
Exam 6: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud75 Questions
Exam 7: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 8: Social Media, Peer Production, and Web 20119 Questions
Exam 9: Facebook: Building a Business From the Social Graph99 Questions
Exam 10: Understanding Software: a Primer for Managers77 Questions
Exam 11: Software in Flux: Partly Cloudy and Sometimes Free82 Questions
Exam 12: The Data Asset: Databases, Business Intelligence, Big Data, and Competitive Advantage81 Questions
Exam 13: A Managers Guide to the Internet and Telecommunications83 Questions
Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else90 Questions
Exam 15: Google in Three Parts: Search, Online Advertising, and Beyond115 Questions
Select questions type
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
(Multiple Choice)
4.8/5
(37)
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
(True/False)
4.8/5
(37)
Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.
(Essay)
4.9/5
(40)
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
(Short Answer)
4.8/5
(39)
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
(True/False)
4.8/5
(32)
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
(Short Answer)
4.8/5
(42)
Spear phishing attacks specifically target a given organization or group of users.
(True/False)
4.8/5
(40)
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
(True/False)
4.7/5
(33)
What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?
(Multiple Choice)
4.7/5
(29)
What security risk could be posed by a botnet large enough to hold a few million zombie computers?
(Multiple Choice)
4.8/5
(43)
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
(Multiple Choice)
4.9/5
(37)
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
(Short Answer)
4.7/5
(30)
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
(True/False)
4.7/5
(38)
Information security policies would be ineffective without _____ and _____.
(Multiple Choice)
4.8/5
(35)
Worms require an executable (a running program) to spread, attaching to other executables.
(True/False)
4.8/5
(36)
Which of the following actions should users take to protect themselves from security attacks?
(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)