Exam 20: Plug It in 7 Protecting Your Information Assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________________________________ actions relate to safe computing and help protect your information and greatly reduce your exposure to fraud and identity theft.

Free
(Short Answer)
4.9/5
(46)
Correct Answer:
Verified

Computer-based

Privacy settings on social networking sites are always easy to find and use.

Free
(True/False)
4.8/5
(45)
Correct Answer:
Verified

False

Which of the following is NOT a computer-based action that can establish wireless security?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

Behavioral actions help protect you against ______________.

(Multiple Choice)
4.8/5
(40)

__________________ proactively monitors your various credit files.

(Multiple Choice)
4.9/5
(39)

List and describe the actions you currently take to ensure the security of your smartphone. What other actions could you and should you be taking?

(Essay)
4.7/5
(35)

Which of the following is NOT a recommendation the book provides for protecting your portable devices?

(Multiple Choice)
4.9/5
(40)

The default on LinkedIn is a public profile; this is generally acceptable since users share professional credentials rather than social information.

(True/False)
4.9/5
(38)

The Social Security Number Protection Act of 2007 restricts the use of Social Security numbers for identification purposes.

(True/False)
4.9/5
(34)

You should limit your use of ___________ cards as a behavioral action to protect your assets.

(Multiple Choice)
4.9/5
(33)

You can eliminate the chances that your identity will be stolen by addressing your behavioral and computer-based actions.

(True/False)
4.8/5
(38)

To protect your information and greatly reduce your exposure to fraud and identity theft, you need to take ___________ actions.

(Multiple Choice)
4.9/5
(32)

__________ helps you detect a fake web site.

(Multiple Choice)
4.8/5
(28)

Which of the following is NOT a behavioral action for protecting your assets?

(Multiple Choice)
5.0/5
(36)

Computer-based actions are the most important ones you can take to protect your information and to greatly reduce your exposure to fraud and identity theft.

(True/False)
4.7/5
(38)

Which of the following is NOT a computer-based action for preventing malware infections?

(Multiple Choice)
4.8/5
(35)

Which of the following is NOT a computer-based action for protecting your privacy?

(Multiple Choice)
4.8/5
(39)

___________________ actions are those actions that do not specifically involve a computer but help protect your information and greatly reduce your exposure to fraud and identity theft.

(Short Answer)
4.8/5
(42)

Your laptop computer ___________ is NOT a sign that your computer may be infected with malware.

(Multiple Choice)
4.9/5
(50)

You can always click on links in e-mails from your bank, your college, or your friends.

(True/False)
4.8/5
(43)
Showing 1 - 20 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)