Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise60 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits96 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager79 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction36 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud91 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World76 Questions
Exam 9: Social Media, Peer Production, and Web 2.0110 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology41 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph101 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 6.050 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts83 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage96 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications81 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity135 Questions
Select questions type
Which of the following statements holds true for the term encryption?
(Multiple Choice)
4.8/5
(40)
One of the reasons organizations delay patches to plug holes in their security applications is:
(Multiple Choice)
4.8/5
(24)
_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.
(Short Answer)
4.9/5
(39)
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
(Multiple Choice)
5.0/5
(36)
Spear phishing attacks specifically target a given organization or group of users.
(True/False)
4.8/5
(34)
_____________ refers to malware that encrypts a user's files (perhaps threatening to delete them), with demands that a user pay to regain control of their data and/or device.
(Short Answer)
4.9/5
(36)
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):
(Multiple Choice)
4.8/5
(28)
Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.
(Short Answer)
4.9/5
(36)
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
(True/False)
4.8/5
(34)
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
(Multiple Choice)
4.9/5
(34)
Two-factor authentication is favored for most security situations since it's considered to be fast and conveient for customres.
(True/False)
4.8/5
(39)
Which of the following statements is consistent with ground realities regarding information security?
(Multiple Choice)
4.9/5
(34)
One of the major problems with the Heartbleed bug in OpenSSL software is that:
(Multiple Choice)
4.8/5
(41)
Briefly explain the steps one should take to ensure that their highest priority accounts are not compromised easily by hackers.
(Essay)
4.7/5
(38)
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
(Short Answer)
4.9/5
(37)
_____ are scrambled character images used to thwart things like automated account setup or ticket buying.
(Short Answer)
4.8/5
(37)
Which of the following statements holds true for the term spoof?
(Multiple Choice)
4.8/5
(45)
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
(Short Answer)
4.9/5
(34)
Describe some of the factors at work that enabled the Target security breach to occur.
(Essay)
4.8/5
(33)
Showing 61 - 80 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)