Exam 18: Tech Guide 5: Protecting your information assets
Exam 1: Introduction to Information Systems63 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems140 Questions
Exam 3: Data and Knowledge Management101 Questions
Exam 4: Networks132 Questions
Exam 5: E-Business and E-Commerce109 Questions
Exam 6: Wireless, Mobile Computing, and Mobile Commerce118 Questions
Exam 7: Web 2.0 and Social Networks72 Questions
Exam 8: Information Systems Within the Organization98 Questions
Exam 9: Customer Relationship Management and Supply Chain Management141 Questions
Exam 10: Business Intelligence100 Questions
Exam 11: Acquiring Information Systems and Applications119 Questions
Exam 12: Ethics and Privacy66 Questions
Exam 13: Information Security114 Questions
Exam 14: Tech Guide 1: Hardware76 Questions
Exam 15: Tech Guide 2: Software53 Questions
Exam 16: Tech Guide 3: Emerging types of enterprise computing57 Questions
Exam 17: Tech Guide 4: Intelligent Systems61 Questions
Exam 18: Tech Guide 5: Protecting your information assets44 Questions
Select questions type
Using both a token/biometric and your personal password is an example of ________.
(Multiple Choice)
4.8/5
(40)
A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
(True/False)
4.8/5
(41)
Your little brother came for a visit and used your laptop.You didn't think anything of it at the time, but now your laptop is running really slow.Which of the following statements is false?
(Multiple Choice)
4.9/5
(36)
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.
(Multiple Choice)
4.8/5
(41)
You got careless and left your laptop in a taxi back from the airport.However, you aren't too worried about your information.Which of the following should not a reason for your attitude?
(Multiple Choice)
4.8/5
(35)
The first step to recover from identity theft is ____________.
(Multiple Choice)
4.9/5
(38)
A(n)_____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.
(Multiple Choice)
4.8/5
(39)
Social engineering attacks are a threat at work but typically not at home.
(True/False)
4.8/5
(38)
A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
(Multiple Choice)
4.8/5
(42)
You should update your definitions before scanning your system with anti-malware software.
(True/False)
4.9/5
(45)
_____________ is an example of a behavioral action you can take to protect your information assets.
(Multiple Choice)
4.8/5
(41)
Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft.
(True/False)
4.8/5
(39)
_____________ is an example of a computer-based action you can take to protect your information assets.
(Multiple Choice)
4.8/5
(35)
It is best to use a straight-line shredder to protect your unused documents.
(True/False)
4.9/5
(43)
Companies that provide proactive protection of your personal information allow customers to lock their credit files.
(True/False)
4.8/5
(29)
Methods you should use to protect your portable devices and information include all of the following except:
(Multiple Choice)
4.9/5
(40)
As businesses improve their information security, organized crime is turning its attention to consumers.
(True/False)
4.9/5
(31)
One strategy for controlling spam is to set up multiple free e-mail accounts.
(True/False)
4.9/5
(31)
Showing 21 - 40 of 44
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)