Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise56 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers79 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems65 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits89 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager71 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction34 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud85 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 9: Social Media, Peer Production, and Web 2.0106 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology32 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph91 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech with Fashion41 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts80 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage92 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications64 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity134 Questions
Select questions type
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
(Multiple Choice)
4.7/5
(28)
Worms require an executable (a running program) to spread, attaching to other executables.
(True/False)
4.9/5
(43)
Describe briefly a few of the physical threats posed by hackers to information security with examples for each.
(Essay)
4.9/5
(26)
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
(True/False)
4.9/5
(39)
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
(True/False)
4.8/5
(28)
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
(Multiple Choice)
4.7/5
(32)
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
(True/False)
4.9/5
(36)
Some of the most common guidelines issued by Web sites when designing a secure password include:
(Multiple Choice)
4.9/5
(31)
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?
(Multiple Choice)
4.9/5
(34)
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
(True/False)
4.9/5
(41)
Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.
(True/False)
4.8/5
(29)
Which of the following statements is consistent with ground realities regarding information security?
(Multiple Choice)
4.9/5
(36)
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.
(Multiple Choice)
4.8/5
(30)
It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.
(True/False)
4.9/5
(32)
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
(Short Answer)
4.9/5
(41)
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
(Multiple Choice)
5.0/5
(36)
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):
(Multiple Choice)
4.9/5
(35)
A vast majority of security breaches are not preventable and happen despite the best security practices.
(True/False)
4.8/5
(41)
Regularly updated software lowers a system's vulnerable attack surface.
(True/False)
4.9/5
(27)
Showing 21 - 40 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)