Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise45 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers70 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits84 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing, Disruptive Innovation, and What This Means for the Manager77 Questions
Exam 6: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud75 Questions
Exam 7: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 8: Social Media, Peer Production, and Web 20119 Questions
Exam 9: Facebook: Building a Business From the Social Graph99 Questions
Exam 10: Understanding Software: a Primer for Managers77 Questions
Exam 11: Software in Flux: Partly Cloudy and Sometimes Free82 Questions
Exam 12: The Data Asset: Databases, Business Intelligence, Big Data, and Competitive Advantage81 Questions
Exam 13: A Managers Guide to the Internet and Telecommunications83 Questions
Exam 14: Information Security: Barbarians at the Gateway and Just About Everywhere Else90 Questions
Exam 15: Google in Three Parts: Search, Online Advertising, and Beyond115 Questions
Select questions type
Some of the most common guidelines issued by Web sites when designing a secure password include:
(Multiple Choice)
4.9/5
(35)
Offering financial or valuable incentives to gain information, access, or favors is a proven method used by social engineering experts.
(True/False)
4.8/5
(38)
What are the steps to be taken by an employee to ensure organizational security?
(Essay)
4.9/5
(36)
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):
(Multiple Choice)
4.8/5
(34)
Which of the following is a valid statement on information security?
(Multiple Choice)
4.9/5
(34)
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
(Multiple Choice)
4.7/5
(38)
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
(Multiple Choice)
4.7/5
(42)
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.
(True/False)
4.8/5
(27)
_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.
(Short Answer)
4.8/5
(34)
The ISO 27000 series of evolving standards represent the set of best practices for developing and improving organizational security.
(True/False)
4.8/5
(43)
A(n) _____ is someone who uncovers computer weaknesses without exploiting them.
(Multiple Choice)
4.8/5
(38)
The term _____ originally referred to a particularly skilled programmer.
(Multiple Choice)
4.8/5
(32)
What are some of the key lessons to be learned from the TJX security breach?
(Essay)
4.8/5
(31)
Implementation of information security in an organization should essentially start with:
(Multiple Choice)
4.8/5
(43)
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?
(Multiple Choice)
4.9/5
(40)
You have received an e-mail that looks suspiciously close to a phishing mail. What is the best course of action to be followed?
(Multiple Choice)
4.8/5
(27)
Which of the following statements holds true for the term encryption?
(Multiple Choice)
4.8/5
(40)
Lobbying for legislation that imposes severe penalties on crooks can help lower adversary costs.
(True/False)
4.9/5
(33)
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
(Short Answer)
4.8/5
(43)
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
(Multiple Choice)
4.9/5
(40)
Showing 61 - 80 of 90
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)