Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise60 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits96 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager79 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction36 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud91 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World76 Questions
Exam 9: Social Media, Peer Production, and Web 2.0110 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology41 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph101 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 6.050 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts83 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage96 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications81 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity135 Questions
Select questions type
An attack on the US power grid by terrorists or a foreign power is indicative of:
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
C
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
E
Public wireless networks are often vulnerable to monitoring and attack. The use of _______ software can limit threats by encrypting network transmissions over a network.
(Short Answer)
4.7/5
(28)
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:
(Multiple Choice)
4.8/5
(27)
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
(Multiple Choice)
4.8/5
(34)
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
(Multiple Choice)
4.9/5
(34)
Information security policies would be ineffective without _____ and _____.
(Multiple Choice)
4.8/5
(30)
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
(Multiple Choice)
4.8/5
(46)
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?
(Multiple Choice)
4.8/5
(29)
Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.
(True/False)
4.8/5
(31)
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
(True/False)
4.9/5
(24)
_____ refers to a trusted third party that provides authentication services in public key encryption schemes.
(Short Answer)
4.8/5
(39)
What are some of the key managerial takeaways from the Target security breach?
(Essay)
4.9/5
(37)
URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL will clearly reveal the destination arrived at when clicked on.
(True/False)
4.9/5
(31)
_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.
(Short Answer)
4.9/5
(38)
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
(True/False)
4.8/5
(36)
The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.
(Short Answer)
4.8/5
(37)
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
(Essay)
5.0/5
(43)
Showing 1 - 20 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)