Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise56 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers79 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems65 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits89 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager71 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction34 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud85 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World73 Questions
Exam 9: Social Media, Peer Production, and Web 2.0106 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology32 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph91 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech with Fashion41 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts80 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage92 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications64 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity134 Questions
Select questions type
Which of the following is a valid statement on information security?
(Multiple Choice)
4.8/5
(43)
Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.
(True/False)
4.9/5
(35)
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
(Multiple Choice)
4.8/5
(34)
The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.
(Short Answer)
4.8/5
(35)
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
(Short Answer)
4.8/5
(35)
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
(Short Answer)
4.9/5
(43)
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
(True/False)
5.0/5
(44)
_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.
(Short Answer)
4.8/5
(42)
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):
(Multiple Choice)
4.8/5
(39)
Viruses are programs that infect other software or files and require:
(Multiple Choice)
4.8/5
(39)
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
(True/False)
4.8/5
(33)
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
(Essay)
4.8/5
(38)
Which of the following statements holds true for the term encryption?
(Multiple Choice)
4.8/5
(41)
_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.
(Short Answer)
4.8/5
(43)
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
(True/False)
4.8/5
(44)
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
(Short Answer)
4.7/5
(32)
_____ refers to a trusted third party that provides authentication services in public key encryption schemes.
(Short Answer)
4.8/5
(36)
Showing 61 - 80 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)