Exam 18: Tech Guide 5: Protecting your information assets
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems140 Questions
Exam 3: Data and Knowledge Management101 Questions
Exam 4: Networks132 Questions
Exam 5: E-Business and E-Commerce109 Questions
Exam 6: Wireless, Mobile Computing, and Mobile Commerce118 Questions
Exam 7: Web 2.0 and Social Networks72 Questions
Exam 8: Information Systems Within the Organization98 Questions
Exam 9: Customer Relationship Management and Supply Chain Management141 Questions
Exam 10: Business Intelligence100 Questions
Exam 11: Acquiring Information Systems and Applications119 Questions
Exam 12: Ethics and Privacy66 Questions
Exam 13: Information Security114 Questions
Exam 14: Tech Guide 1: Hardware76 Questions
Exam 15: Tech Guide 2: Software53 Questions
Exam 16: Tech Guide 3: Emerging types of enterprise computing57 Questions
Exam 17: Tech Guide 4: Intelligent Systems61 Questions
Exam 18: Tech Guide 5: Protecting your information assets44 Questions
Select questions type
Which of the following is a computer action you can take to prevent malware infections?
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
D
________________ is an example of a computer-based action you can take to protect your information assets.
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
A
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
Free
(True/False)
4.9/5
(36)
Correct Answer:
False
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.
(Multiple Choice)
4.9/5
(36)
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.
(Multiple Choice)
4.8/5
(38)
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.
(Multiple Choice)
4.7/5
(37)
You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.
(True/False)
4.9/5
(37)
Which of the following attacks is most closely associated with downloading and installing patches immediately?
(Multiple Choice)
4.8/5
(40)
Which of the following statements about companies that provide proactive protection of your information assets is not correct?
(Multiple Choice)
4.9/5
(43)
The worst browser to use to protect yourself from malware infections is ________.
(Multiple Choice)
4.8/5
(28)
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
(True/False)
4.7/5
(36)
A _____ offers you the option of shopping online with a disposable credit card number.
(Multiple Choice)
4.7/5
(40)
Content-filtering software performs all of the following functions except:
(Multiple Choice)
4.9/5
(37)
Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.
(True/False)
4.8/5
(27)
You should ask whether your Social Security number is necessary for identification or if any combination of nine numbers and letters will do just as well.
(True/False)
4.8/5
(37)
It is possible for criminals to gain information about many people from social networking sites.
(True/False)
4.9/5
(33)
Personal firewalls perform all of the following functions except:
(Multiple Choice)
4.7/5
(41)
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?
(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)