Exam 18: Technology Guide 5 Protecting Your Information Assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft.

(True/False)
4.8/5
(37)

Your liability with credit cards is typically ________, whereas your liability with debit cards is _________.

(Multiple Choice)
4.9/5
(41)

You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information. Which of the following should not be a reason for your attitude?

(Multiple Choice)
5.0/5
(47)

Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?

(Multiple Choice)
5.0/5
(37)

A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.

(Multiple Choice)
4.9/5
(38)

Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?

(Multiple Choice)
4.8/5
(37)

Which of the following is a good password?

(Multiple Choice)
4.9/5
(38)

You should update your definitions before scanning your system with anti-malware software.

(True/False)
4.7/5
(39)

Social engineering attacks are a threat at work but typically not at home.

(True/False)
4.8/5
(49)

Describe the steps you should take to protect yourself when computing wirelessly.

(Essay)
4.9/5
(40)

A _______ cookie either originates on, or is sent to, a different website than the one you are currently viewing.

(Multiple Choice)
5.0/5
(46)

For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.

(Multiple Choice)
4.8/5
(41)

A ________ offers you the option of shopping online with a disposable credit card number.

(Multiple Choice)
4.7/5
(47)

It is best to use a straight-line shredder to protect your unused documents.

(True/False)
5.0/5
(39)

The worst browser to use to protect yourself from malware infections is ________.

(Multiple Choice)
4.8/5
(37)

Using credit cards with your face on them will decrease your information security because clerks will look for your signature.

(True/False)
5.0/5
(41)

One strategy for controlling spam is to set up multiple free e-mail accounts.

(True/False)
4.8/5
(32)

A(n)__________ is a computer to which you connect, which in turn connects to the website you wish to visit.

(Multiple Choice)
4.9/5
(34)

As businesses improve their information security, organized crime is turning its attention to consumers.

(True/False)
4.9/5
(39)

It's hard to remember lots of passwords, so why not use just one?

(Short Answer)
5.0/5
(42)
Showing 21 - 40 of 55
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)