Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise56 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers79 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems65 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits89 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager71 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction34 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud85 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 9: Social Media, Peer Production, and Web 2.0106 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology32 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph91 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech with Fashion41 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts80 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage92 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications64 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity134 Questions
Select questions type
Spear phishing attacks specifically target a given organization or group of users.
(True/False)
4.8/5
(38)
One of the reasons organizations delay patches to plug holes in their security applications is:
(Multiple Choice)
4.8/5
(31)
_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
(Short Answer)
4.7/5
(31)
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
(Multiple Choice)
4.9/5
(35)
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
(Multiple Choice)
4.8/5
(32)
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:
(Multiple Choice)
4.7/5
(37)
Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.
(Essay)
4.9/5
(24)
_____ are scrambled character images used to thwart things like automated account setup or ticket buying.
(Short Answer)
4.9/5
(38)
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
(Multiple Choice)
4.7/5
(30)
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
(Short Answer)
4.9/5
(45)
An attack on the US power grid by terrorists or a foreign power is indicative of:
(Multiple Choice)
4.9/5
(33)
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
(Multiple Choice)
4.8/5
(38)
Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:
(Multiple Choice)
4.7/5
(40)
What are some of the key managerial takeaways from the Target security breach?
(Essay)
4.8/5
(34)
The term _____ originally referred to a particularly skilled programmer.
(Multiple Choice)
4.9/5
(28)
Describe some of the factors at work that enabled the Target security breach to occur.
(Essay)
4.9/5
(36)
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
(True/False)
4.8/5
(35)
Showing 41 - 60 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)