Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise60 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems68 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits96 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager79 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction36 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud91 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World76 Questions
Exam 9: Social Media, Peer Production, and Web 2.0110 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology41 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph101 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry by Blending Tech With Fashion, John Gallaugher - Information Systems: a Managers Guide to Harnessing Technology, Version 6.050 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts83 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage96 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications81 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else87 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity135 Questions
Select questions type
Describe briefly a few of the physical threats posed by hackers to information security with examples for each.
(Essay)
4.9/5
(28)
Which of the following are considered sources of information that can potentially be used by social engineers?
(Multiple Choice)
4.7/5
(33)
What are the steps to be taken with respect to firm employees in order to ensure organizational security?
(Essay)
4.7/5
(32)
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
(Multiple Choice)
4.8/5
(38)
In public-key encryption systems, the functions of the public and private keys are interchangeable.
(True/False)
4.9/5
(40)
It's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.
(True/False)
4.9/5
(36)
Viruses are programs that infect other software or files and require:
(Multiple Choice)
4.8/5
(27)
Showing 81 - 87 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)