Exam 18: Technology Guide 5 Protecting Your Information Assets
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems116 Questions
Exam 3: Ethics and Privacy51 Questions
Exam 4: Information Security and Controls91 Questions
Exam 5: Data and Knowledge Management90 Questions
Exam 6: Telecommunications and Networking108 Questions
Exam 7: E-Business and E-Commerce90 Questions
Exam 8: Wireless, Mobile Computing, and Mobile Commerce93 Questions
Exam 9: Social Computing61 Questions
Exam 10: Information Systems Within the Organization84 Questions
Exam 11: Customer Relationship Management and Supply Chain Management128 Questions
Exam 12: Business Intelligence82 Questions
Exam 13: Acquiring Information Systems and Applications95 Questions
Exam 14: Technology Guide 1 Hardware56 Questions
Exam 15: Technology Guide 2 Software40 Questions
Exam 16: Technology Guide 3 Cloud Computing42 Questions
Exam 17: Technology Guide 4 Intelligent Systems36 Questions
Exam 18: Technology Guide 5 Protecting Your Information Assets45 Questions
Select questions type
What functions should you expect from content-filtering software on your computer?
(Short Answer)
4.8/5
(39)
Methods you should use to protect your portable devices and information include all of the following except:
(Multiple Choice)
4.7/5
(34)
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
(Multiple Choice)
5.0/5
(36)
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.
(Multiple Choice)
4.8/5
(32)
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
(True/False)
4.8/5
(34)
Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.
(True/False)
4.8/5
(44)
Which of the following attacks is most closely associated with downloading and installing patches immediately?
(Multiple Choice)
4.9/5
(32)
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.
(Multiple Choice)
4.8/5
(28)
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.
(Multiple Choice)
4.8/5
(39)
Social engineering attacks are a threat at work but typically not at home.
(True/False)
4.7/5
(42)
A _____ offers you the option of shopping online with a disposable credit card number.
(Multiple Choice)
5.0/5
(36)
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
(True/False)
4.8/5
(35)
If your identity is stolen, what is the first thing you should do?
(Multiple Choice)
4.8/5
(40)
You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information. Which of the following should not a reason for your attitude?
(Multiple Choice)
4.9/5
(43)
Using credit cards with your face on them will decrease your information security because clerks will look for your signature.
(True/False)
4.8/5
(33)
You should update your definitions before scanning your system with anti-malware software.
(True/False)
4.8/5
(42)
Describe the steps you should take to protect yourself when computing wirelessly.
(Essay)
4.9/5
(28)
It's hard to remember lots of passwords, so why not use just one?
(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)