Exam 18: Technology Guide 5 Protecting Your Information Assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What functions should you expect from content-filtering software on your computer?

(Short Answer)
4.8/5
(39)

Methods you should use to protect your portable devices and information include all of the following except:

(Multiple Choice)
4.7/5
(34)

A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

(Multiple Choice)
5.0/5
(36)

Which of the following is a good password?

(Multiple Choice)
5.0/5
(44)

A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.

(Multiple Choice)
4.8/5
(32)

It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.

(True/False)
4.8/5
(34)

Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.

(True/False)
4.8/5
(44)

Which of the following attacks is most closely associated with downloading and installing patches immediately?

(Multiple Choice)
4.9/5
(32)

Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.

(Multiple Choice)
4.8/5
(28)

For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.

(Multiple Choice)
4.8/5
(39)

Social engineering attacks are a threat at work but typically not at home.

(True/False)
4.7/5
(42)

A _____ offers you the option of shopping online with a disposable credit card number.

(Multiple Choice)
5.0/5
(36)

Discuss the dangers of social networking Web sites.

(Essay)
4.8/5
(31)

Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.

(True/False)
4.8/5
(35)

If your identity is stolen, what is the first thing you should do?

(Multiple Choice)
4.8/5
(40)

You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information. Which of the following should not a reason for your attitude?

(Multiple Choice)
4.9/5
(43)

Using credit cards with your face on them will decrease your information security because clerks will look for your signature.

(True/False)
4.8/5
(33)

You should update your definitions before scanning your system with anti-malware software.

(True/False)
4.8/5
(42)

Describe the steps you should take to protect yourself when computing wirelessly.

(Essay)
4.9/5
(28)

It's hard to remember lots of passwords, so why not use just one?

(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)