Exam 18: Technology Guide 5 Protecting Your Information Assets
You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.
False
________________ is an example of a computer-based action you can take to protect your information assets.
A
List and explain the actions you should take if your identity is stolen.
If your identity is stolen, there are several important actions you should take to protect yourself and minimize the damage.
1. Contact the authorities: Report the identity theft to the police and file a report. This will create an official record of the crime and may be necessary for resolving any fraudulent accounts or charges.
2. Contact your financial institutions: Notify your bank, credit card companies, and any other financial institutions where you have accounts. They can help you monitor for any suspicious activity and may be able to freeze or close compromised accounts.
3. Place a fraud alert on your credit reports: Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) to place a fraud alert on your credit reports. This will make it more difficult for the thief to open new accounts in your name.
4. Monitor your credit reports: Keep a close eye on your credit reports for any unauthorized activity. You are entitled to a free copy of your credit report from each of the three major credit bureaus once a year.
5. Update your passwords and PINs: Change the passwords and PINs for all of your online accounts, especially those related to your finances and personal information.
6. Consider identity theft protection services: There are companies that offer identity theft protection services, which can help monitor for any suspicious activity and provide assistance in resolving identity theft issues.
7. Be cautious with personal information: Be extra cautious with your personal information, such as your Social Security number, and only share it when absolutely necessary.
By taking these actions, you can help protect yourself and minimize the impact of identity theft. It's also important to stay vigilant and continue monitoring your accounts and credit reports for any signs of fraudulent activity.
Using both a token/biometric and your personal password is an example of ________.
What functions should you expect from content-filtering software on your computer?
Content-filtering software performs all of the following functions except:
A ______ cookie either originates on, or is sent to, the website that you are currently viewing.
It is possible for criminals to gain information about many people from social networking sites.
You should ask whether your Social Security Number is necessary for identification or if any combination of nine numbers and letters will do just as well.
A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.
Companies that provide proactive protection of your personal information allow customers to lock their credit files.
If your identity is stolen, what is the first thing you should do?
Personal firewalls perform all of the following functions except:
_____________ is an example of a behavioural action you can take to protect your information assets.
___________ is an example of a behavioural action you can take to protect your information assets.
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)