Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise60 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits96 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager79 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction36 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud91 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World76 Questions
Exam 9: Social Media, Peer Production, and Web 2.0110 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology41 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph101 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 6.050 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts83 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage96 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications81 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity135 Questions
Select questions type
Which of the following is a valid statement on information security?
(Multiple Choice)
4.8/5
(33)
A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?
(Multiple Choice)
4.8/5
(38)
A vast majority of security breaches are not preventable and happen despite the best security practices.
(True/False)
4.8/5
(39)
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
(Short Answer)
4.9/5
(29)
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
(Multiple Choice)
4.8/5
(35)
Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.
(True/False)
4.8/5
(32)
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
(Multiple Choice)
4.9/5
(26)
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?
(Multiple Choice)
4.8/5
(29)
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
(True/False)
4.9/5
(33)
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
(Short Answer)
4.9/5
(35)
Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:
(Multiple Choice)
4.8/5
(37)
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
(True/False)
4.7/5
(34)
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.
(True/False)
4.9/5
(35)
_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.
(Short Answer)
4.8/5
(39)
Regularly updated software lowers a system's vulnerable attack surface.
(True/False)
4.7/5
(43)
The term _____ originally referred to a particularly skilled programmer.
(Multiple Choice)
4.8/5
(26)
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
(True/False)
4.7/5
(29)
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)