Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise45 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers70 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits84 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing, Disruptive Innovation, and What This Means for the Manager77 Questions
Exam 6: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud75 Questions
Exam 7: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 8: Social Media, Peer Production, and Web 20119 Questions
Exam 9: Facebook: Building a Business From the Social Graph99 Questions
Exam 10: Understanding Software: a Primer for Managers77 Questions
Exam 11: Software in Flux: Partly Cloudy and Sometimes Free82 Questions
Exam 12: The Data Asset: Databases, Business Intelligence, Big Data, and Competitive Advantage81 Questions
Exam 13: A Managers Guide to the Internet and Telecommunications83 Questions
Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else90 Questions
Exam 15: Google in Three Parts: Search, Online Advertising, and Beyond115 Questions
Select questions type
_____ can be either software-based or hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
(Multiple Choice)
4.9/5
(30)
Viruses are programs that infect other software or files and require:
(Multiple Choice)
5.0/5
(33)
An attack on the US power grid by terrorists or a foreign power is indicative of:
(Multiple Choice)
4.9/5
(27)
Which of the following measures can a firm undertake to counter the threat of an SQL injection?
(Multiple Choice)
4.7/5
(40)
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
(Short Answer)
4.9/5
(34)
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
(True/False)
4.8/5
(43)
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
(Multiple Choice)
4.8/5
(41)
Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are known as:
(Multiple Choice)
4.9/5
(39)
The market for stolen data is stagnant and most hackers use stolen data like credit card numbers for personal use.
(True/False)
4.8/5
(42)
Which of the following statements holds true for the term spoof?
(Multiple Choice)
4.8/5
(37)
Which of the following best represents a method a social engineer might use to infiltrate a system?
(Multiple Choice)
4.8/5
(43)
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
(Multiple Choice)
5.0/5
(39)
Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters.
(True/False)
4.9/5
(37)
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
(True/False)
4.9/5
(40)
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
(Multiple Choice)
4.8/5
(32)
_____ are scrambled character images used to thwart things like automated account setup or ticket buying.
(Short Answer)
4.9/5
(37)
The e-mail password of a senior employee in an organization was compromised by someone looking over as the employee accessed his account. This is most likely a case of:
(Multiple Choice)
4.9/5
(38)
URL-shortening services such as bit.ly help expose the intention of phishing posts.
(True/False)
4.8/5
(33)
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
(True/False)
4.9/5
(40)
Which weakness of Web sites to launch attacks does an SQL injection technique exploit?
(Multiple Choice)
4.8/5
(40)
Showing 41 - 60 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)