Exam 18: Tech Guide 5: Protecting your information assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a computer action you can take to prevent malware infections?

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

D

________________ is an example of a computer-based action you can take to protect your information assets.

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

A

It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.

(Multiple Choice)
4.9/5
(36)

_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.

(Multiple Choice)
4.8/5
(38)

Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.

(Multiple Choice)
4.7/5
(37)

You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.

(True/False)
4.9/5
(37)

Which of the following attacks is most closely associated with downloading and installing patches immediately?

(Multiple Choice)
4.8/5
(40)

Which of the following statements about companies that provide proactive protection of your information assets is not correct?

(Multiple Choice)
4.9/5
(43)

The worst browser to use to protect yourself from malware infections is ________.

(Multiple Choice)
4.8/5
(28)

You should use a Post Office box for your personal mail.

(True/False)
4.9/5
(35)

Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.

(True/False)
4.7/5
(36)

A _____ offers you the option of shopping online with a disposable credit card number.

(Multiple Choice)
4.7/5
(40)

Content-filtering software performs all of the following functions except:

(Multiple Choice)
4.9/5
(37)

Which of the following is a good password?

(Multiple Choice)
5.0/5
(28)

Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.

(True/False)
4.8/5
(27)

You should ask whether your Social Security number is necessary for identification or if any combination of nine numbers and letters will do just as well.

(True/False)
4.8/5
(37)

It is possible for criminals to gain information about many people from social networking sites.

(True/False)
4.9/5
(33)

Personal firewalls perform all of the following functions except:

(Multiple Choice)
4.7/5
(41)

Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?

(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)