Exam 20: Plug It in 7 Protecting Your Information Assets
Exam 1: Introduction to Information Systems76 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems92 Questions
Exam 3: Data and Knowledge Management95 Questions
Exam 4: Telecommunications and Networking90 Questions
Exam 5: Business Analytics83 Questions
Exam 6: Ethics and Privacy89 Questions
Exam 7: Information Security98 Questions
Exam 8: Social Computing87 Questions
Exam 9: E-Business and E-Commerce101 Questions
Exam 10: Wireless, Mobile Computing, and Mobile Commerce88 Questions
Exam 11: Information Systems Within the Organization84 Questions
Exam 12: Customer Relationship Management74 Questions
Exam 13: Supply Chain Management77 Questions
Exam 14: Acquiring Information Systems and Applications90 Questions
Exam 15: Plug It in 1 Business Processes and Business Process Management64 Questions
Exam 16: Plug It in 2 Hardware and Soft Ware81 Questions
Exam 17: Plug It in 4 Cloud Computing70 Questions
Exam 18: Plug It in 5 Artificial Intelligence46 Questions
Exam 19: Plug It in 6 Project Management55 Questions
Exam 20: Plug It in 7 Protecting Your Information Assets39 Questions
Select questions type
_________________________________ actions relate to safe computing and help protect your information and greatly reduce your exposure to fraud and identity theft.
Free
(Short Answer)
4.9/5
(46)
Correct Answer:
Computer-based
Privacy settings on social networking sites are always easy to find and use.
Free
(True/False)
4.8/5
(45)
Correct Answer:
False
Which of the following is NOT a computer-based action that can establish wireless security?
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
__________________ proactively monitors your various credit files.
(Multiple Choice)
4.9/5
(39)
List and describe the actions you currently take to ensure the security of your smartphone. What other actions could you and should you be taking?
(Essay)
4.7/5
(35)
Which of the following is NOT a recommendation the book provides for protecting your portable devices?
(Multiple Choice)
4.9/5
(40)
The default on LinkedIn is a public profile; this is generally acceptable since users share professional credentials rather than social information.
(True/False)
4.9/5
(38)
The Social Security Number Protection Act of 2007 restricts the use of Social Security numbers for identification purposes.
(True/False)
4.9/5
(34)
You should limit your use of ___________ cards as a behavioral action to protect your assets.
(Multiple Choice)
4.9/5
(33)
You can eliminate the chances that your identity will be stolen by addressing your behavioral and computer-based actions.
(True/False)
4.8/5
(38)
To protect your information and greatly reduce your exposure to fraud and identity theft, you need to take ___________ actions.
(Multiple Choice)
4.9/5
(32)
Which of the following is NOT a behavioral action for protecting your assets?
(Multiple Choice)
5.0/5
(36)
Computer-based actions are the most important ones you can take to protect your information and to greatly reduce your exposure to fraud and identity theft.
(True/False)
4.7/5
(38)
Which of the following is NOT a computer-based action for preventing malware infections?
(Multiple Choice)
4.8/5
(35)
Which of the following is NOT a computer-based action for protecting your privacy?
(Multiple Choice)
4.8/5
(39)
___________________ actions are those actions that do not specifically involve a computer but help protect your information and greatly reduce your exposure to fraud and identity theft.
(Short Answer)
4.8/5
(42)
Your laptop computer ___________ is NOT a sign that your computer may be infected with malware.
(Multiple Choice)
4.9/5
(50)
You can always click on links in e-mails from your bank, your college, or your friends.
(True/False)
4.8/5
(43)
Showing 1 - 20 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)