Exam 18: Technology Guide 5 Protecting Your Information Assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a computer action you can take to prevent malware infections?

(Multiple Choice)
4.9/5
(35)

Describe the functions of anti-malware software on your computer.

(Essay)
4.9/5
(37)

Why is it so important to protect your information assets?

(Short Answer)
4.9/5
(41)

_______ software logs keystrokes, e-mails, applications, windows, websites, Internet connection, passwords, chat conversations, webcams, and screenshots.

(Multiple Choice)
4.9/5
(38)

Which of the following statements is not correct?

(Multiple Choice)
4.8/5
(39)

_____________ is an example of a computer-based action you can take to protect your information assets.

(Multiple Choice)
4.8/5
(26)

Methods you should use to protect your portable devices and information include all of the following except:

(Multiple Choice)
4.8/5
(28)

Discuss the pros and cons of using credit cards vs. debit cards.

(Essay)
4.8/5
(36)

Which of the following attacks is most closely associated with downloading and installing patches immediately?

(Multiple Choice)
5.0/5
(48)

The first step to recover from identity theft is ____________.

(Multiple Choice)
4.8/5
(37)

What functions should you expect from monitoring software on your computer?

(Short Answer)
4.8/5
(39)

What functions should a personal firewall provide for you?

(Short Answer)
4.8/5
(30)

Which of the following statements about companies that provide proactive protection of your information assets is not correct?

(Multiple Choice)
4.9/5
(44)

Discuss the benefits of using the services of companies that provide proactive protection of your personal information.

(Essay)
4.9/5
(38)

Discuss the dangers of social networking websites.

(Essay)
4.8/5
(35)
Showing 41 - 55 of 55
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)