Exam 18: Tech Guide 5: Protecting your information assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using both a token/biometric and your personal password is an example of ________.

(Multiple Choice)
4.8/5
(40)

A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.

(True/False)
4.8/5
(41)

Your little brother came for a visit and used your laptop.You didn't think anything of it at the time, but now your laptop is running really slow.Which of the following statements is false?

(Multiple Choice)
4.9/5
(36)

A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.

(Multiple Choice)
4.8/5
(41)

You should keep close track of your credit card billing cycles.

(True/False)
4.8/5
(37)

You got careless and left your laptop in a taxi back from the airport.However, you aren't too worried about your information.Which of the following should not a reason for your attitude?

(Multiple Choice)
4.8/5
(35)

The first step to recover from identity theft is ____________.

(Multiple Choice)
4.9/5
(38)

A(n)_____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.

(Multiple Choice)
4.8/5
(39)

Social engineering attacks are a threat at work but typically not at home.

(True/False)
4.8/5
(38)

A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.

(Multiple Choice)
4.8/5
(42)

You should update your definitions before scanning your system with anti-malware software.

(True/False)
4.9/5
(45)

_____________ is an example of a behavioral action you can take to protect your information assets.

(Multiple Choice)
4.8/5
(41)

Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft.

(True/False)
4.8/5
(39)

_____________ is an example of a computer-based action you can take to protect your information assets.

(Multiple Choice)
4.8/5
(35)

It is best to use a straight-line shredder to protect your unused documents.

(True/False)
4.9/5
(43)

Companies that provide proactive protection of your personal information allow customers to lock their credit files.

(True/False)
4.8/5
(29)

Methods you should use to protect your portable devices and information include all of the following except:

(Multiple Choice)
4.9/5
(40)

As businesses improve their information security, organized crime is turning its attention to consumers.

(True/False)
4.9/5
(31)

One strategy for controlling spam is to set up multiple free e-mail accounts.

(True/False)
4.9/5
(31)

Which of the following statements is not correct?

(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)