Exam 18: Technology Guide 5 Protecting Your Information Assets
Exam 1: Introduction to Information Systems86 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems147 Questions
Exam 3: Ethics and Privacy74 Questions
Exam 4: Information Security and Controls129 Questions
Exam 5: Data and Knowledge Management116 Questions
Exam 6: Telecommunications and Networking141 Questions
Exam 7: E-Business and E-Commerce123 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce123 Questions
Exam 9: Social Computing83 Questions
Exam 10: Information Systems Within the Organization118 Questions
Exam 11: Customer Relationship Management and Supply Chain Management175 Questions
Exam 12: Business Intelligence109 Questions
Exam 13: Acquiring Information Systems and Applications135 Questions
Exam 14: Technology Guide 1 : Hardware81 Questions
Exam 15: Technology Guide 2 : Software59 Questions
Exam 16: Technology Guide 3 : Cloud Computing65 Questions
Exam 17: Technology Guide 4 : Intelligent Systems68 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets55 Questions
Select questions type
Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft.
(True/False)
4.8/5
(37)
Your liability with credit cards is typically ________, whereas your liability with debit cards is _________.
(Multiple Choice)
4.9/5
(41)
You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information. Which of the following should not be a reason for your attitude?
(Multiple Choice)
5.0/5
(47)
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?
(Multiple Choice)
5.0/5
(37)
A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
(Multiple Choice)
4.9/5
(38)
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?
(Multiple Choice)
4.8/5
(37)
You should update your definitions before scanning your system with anti-malware software.
(True/False)
4.7/5
(39)
Social engineering attacks are a threat at work but typically not at home.
(True/False)
4.8/5
(49)
Describe the steps you should take to protect yourself when computing wirelessly.
(Essay)
4.9/5
(40)
A _______ cookie either originates on, or is sent to, a different website than the one you are currently viewing.
(Multiple Choice)
5.0/5
(46)
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.
(Multiple Choice)
4.8/5
(41)
A ________ offers you the option of shopping online with a disposable credit card number.
(Multiple Choice)
4.7/5
(47)
It is best to use a straight-line shredder to protect your unused documents.
(True/False)
5.0/5
(39)
The worst browser to use to protect yourself from malware infections is ________.
(Multiple Choice)
4.8/5
(37)
Using credit cards with your face on them will decrease your information security because clerks will look for your signature.
(True/False)
5.0/5
(41)
One strategy for controlling spam is to set up multiple free e-mail accounts.
(True/False)
4.8/5
(32)
A(n)__________ is a computer to which you connect, which in turn connects to the website you wish to visit.
(Multiple Choice)
4.9/5
(34)
As businesses improve their information security, organized crime is turning its attention to consumers.
(True/False)
4.9/5
(39)
It's hard to remember lots of passwords, so why not use just one?
(Short Answer)
5.0/5
(42)
Showing 21 - 40 of 55
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)