Professional Documents
Culture Documents
Information Technology For Management Digital Strategies For Insight Action and Sustainable Performance 10th Edition Turban Test Bank 1
Information Technology For Management Digital Strategies For Insight Action and Sustainable Performance 10th Edition Turban Test Bank 1
Test Bank
Multiple Choice
1. The discount retailer Target suffered a hacker attack during the fourth quarter of 2013
(4Q2013) that exposed customer account information. Which of the following was not an
impact of Target’s hacker attack and data breach?
a. 4Q 2013 profit dropped 46% and sales revenue fell 5.3 % after breach was
disclosed.
b. Gartner estimated the cost of the breach from $400 million to $450 million
c. Target faced 2 lawsuits—one related to privacy invasion and one for negligence.
1
d. The incident scared shoppers away, affecting the company’s profits throughout
2014.
Answer: C
Difficulty: Hard
Section Ref: Opening Case 5.1AACSB: Dynamics of the global economy
2. Almost half of the 2013 breaches occurred in ________, where the largest number of records
was exposed—more than 540 million data records or 66 percent.
a. Asia
b. China
c. Europe
d. The United States
Answer: D
Difficulty: Easy
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
2
3. Negative consequences of lax cybersecurity that companies tend to face include all of the
following except ________.
Answer: B
Difficulty: Easy
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
4. The main cause of data breaches is ________, which is so successful because of ________
when management does not do enough to defend against cyberthreats.
Answer: B
Difficulty: Medium
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
Answer: A
Difficulty: Easy
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
3
6. A(n) ________ attack bombards a network or website with traffic to crash it and leave it
vulnerable to other threats.
Answer: B
Difficulty: Medium
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
7. Attacks ________ could significantly disrupt the functioning of government and business—
and trigger cascading effects far beyond the targeted sector and physical location of the
incident.
a. By hacktivists
b. By hackers
c. On critical infrastructure
d. On industrial control systems
Answer: C
Difficulty: Hard
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
8. Which of the following represents a cybersecurity concern about employees using their own
smartphones for work purposes?
a. Employees will spend too much time playing games or using entertainment and
recreation apps, thus reducing productivity.
b. Managers will be unable to monitor the time spent on personal calls made during
work hours.
c. Many personal smartphones do not have anti-malware or data encryption apps,
creating a security problem with respect to any confidential business data stored
on the device.
d. Consumer-quality equipment are more likely to break or malfunction than
enterprise quality devices.
Answer: C
Difficulty: Medium
4
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
9. ________ is also known as human hacking—tricking users into revealing their credentials
and then using them to gain access to networks or accounts.
a. Android-hacking
b. BYOD
c. Hacktivism
d. Social engineering
Answer: D
Difficulty: Medium
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
10. Experts believe the three greatest cybersecurity dangers over the next few years will involve
all of the following except __________.
a. persistent threats
b. POS attacks
c. mobile computing
d. the use of social media
Answer: B
Difficulty: Hard
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
11. ____________ is/are defined as “systems and assets, whether physical or virtual, so vital to
the United States that the incapacity or destruction of such systems and assets would have a
debilitating impact on security, national economic security, national public health or safety,
or any combination of those matters.”
a. Critical infrastructure
b. Cyber architecture
c. National networks
d. Strategic assets
Answer: A
Difficulty: Medium
Section Ref: 5.1 The Face and Future of Cyberthreats
AACSB: Use of Information Technology
5
Another document from Scribd.com that is
random and unrelated content:
The Project Gutenberg eBook of Das Buch vom eisernen
Kanzler: Eine Erzählung für Deutschlands Jugend
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: German
Anton Ohorn
Mit Illustrationen in Farbendruck von Max Wulff