Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise56 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers79 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems65 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits89 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager71 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction34 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud85 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 9: Social Media, Peer Production, and Web 2.0106 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology32 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph91 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech with Fashion41 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts80 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage92 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications64 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity134 Questions
Select questions type
Which of the following statements holds true for the term spoof?
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
(Short Answer)
4.9/5
(38)
What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?
(Multiple Choice)
4.7/5
(34)
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
(True/False)
4.8/5
(38)
Which of the following are considered sources of information that can potentially be used by social engineers?
(Multiple Choice)
4.9/5
(32)
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.
(True/False)
4.9/5
(29)
Information security policies would be ineffective without _____ and _____.
(Multiple Choice)
4.8/5
(33)
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
(Multiple Choice)
4.9/5
(24)
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.
(True/False)
4.8/5
(28)
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
(True/False)
4.8/5
(32)
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.
(True/False)
4.7/5
(28)
One of the major problems with the Heartbleed bug in OpenSSL software is that:
(Multiple Choice)
4.9/5
(42)
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
(Multiple Choice)
4.8/5
(36)
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.
(Short Answer)
4.7/5
(36)
Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.
(Essay)
4.9/5
(35)
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?
(Multiple Choice)
4.8/5
(26)
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
(Essay)
4.8/5
(39)
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
(True/False)
4.8/5
(32)
Showing 1 - 20 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)