MGT 3550

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

As of 2016 what was the average cost of a data breach in the United States?

$7 million.

An example of a hacking job motivated by retaliation is:

A person hacks a government website to act against inaction by the government.

The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called:

Artificial intelligence.

A CIO is the company's:

Chief information officer.

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as:

Cybercrime.

This annual international gathering on January 28 brought together leaders from the U.S. and dozens of European countries to address the global nature of cyberattacks:

Data Privacy Day.

One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was:

Ensuring the vehicles were safer than driver-controlled automobiles.

A 2017 IBM study predicted that the use of cognitive computing would decline rapidly over the next decade.

FALSE

Cybersecurity experts recommend that firms implement an incident-response plan for cyberattacks, which are strictly preventative in nature.

FALSE

Net neutrality refers to the principle that the wealthier users should pay higher rates for faster Internet speeds.

FALSE

The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.

FALSE

The EU law passed in 2018 that required companies to promptly report personal data breaches was called:

General Data Protection Regulation.

Over time the role of the CIO:

Has become more integrated into the overall strategic direction of the firm.

Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"?

Iran and China.

The role of the CIO includes all of these tasks except:

Monitoring the appropriate level of employee productivity.

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?

Support from executive leadership. Involvement by all functional departments. Focus on how to respond to a breach. (All of these answers are correct.)

E-business refers to electronic exchanges from business to business and consumer to business.

TRUE

In 2014, NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.

TRUE

One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.

TRUE

Robotic technology has advanced enough to generate many new business opportunities.

TRUE

Some experts believe that cybercrime can only be controlled through international government coordination.

TRUE

The primary reason that hackers hack is to make money.

TRUE

According to McKinsey and Company, which position cannot be easily replaced with robots?

Team managers.

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:

White hatters.

A critical characteristic of a successful CIO is:

A leader with the ability to speak the language of the business


Set pelajaran terkait

Exam 1 and 2 Questions COSC 4360

View Set

Boolean Operators / Search Operators

View Set

A.C. CIRCUITS (SERIES AND PARALLEL)

View Set

Chapter eight: risk and rate of return practice quiz

View Set

Chap 19 -Gilded Age - Labor, Unions

View Set

Lecture 16 - The Medieval European Landscape

View Set