Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise60 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits96 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager79 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction36 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud91 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World76 Questions
Exam 9: Social Media, Peer Production, and Web 2.0110 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology41 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph101 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 6.050 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts83 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage96 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications81 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity135 Questions
Select questions type
Some of the most common guidelines issued by Web sites when designing a secure password include:
(Multiple Choice)
4.8/5
(28)
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.
(True/False)
4.9/5
(32)
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
(True/False)
4.8/5
(41)
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
(Essay)
4.9/5
(38)
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.
(True/False)
4.7/5
(20)
What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?
(Multiple Choice)
4.8/5
(35)
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
(True/False)
4.9/5
(32)
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):
(Multiple Choice)
4.9/5
(32)
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of:
(Multiple Choice)
4.9/5
(33)
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
(True/False)
4.8/5
(32)
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
(True/False)
4.8/5
(30)
_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
(Short Answer)
4.9/5
(30)
The phrase ______________ refers to security where identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification
(Short Answer)
4.7/5
(35)
Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.
(Essay)
4.8/5
(35)
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.
(True/False)
4.8/5
(33)
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)