Exam 20: Plug It in 7 Protecting Your Information Assets

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT a computer-based action for preventing malware infections?

(Multiple Choice)
4.9/5
(30)

Which of the following is NOT a mobile device best practice?

(Multiple Choice)
4.9/5
(42)

__________ helps you detect a worm on your computer.

(Multiple Choice)
4.8/5
(42)

Many employers search social networking sites for information on potential employees.

(True/False)
4.9/5
(37)

According to Symantec, if you connected an unprotected PC to the internet in 2003, it would have been attacked within 15 minutes; today, that same computer would be attacked within seconds.

(True/False)
4.9/5
(36)

List and describe the behavioral actions you currently take to protect your assets. What other actions could you and should you be taking?

(Essay)
4.8/5
(45)

Which of the following is NOT a computer-based action that can establish wireless security?

(Multiple Choice)
4.9/5
(32)

Which of the following is NOT a mobile device best practice?

(Multiple Choice)
4.8/5
(35)

Which of the following is NOT a behavioral action for protecting your assets?

(Multiple Choice)
4.9/5
(33)

Which of the following is NOT a computer-based action that can establish wireless security?

(Multiple Choice)
4.9/5
(38)

Using cross-cut or confetti shredding to discard mail or old records helps protect you against __________.

(Multiple Choice)
4.9/5
(26)

What authentication factors are available on your portable electronic devices (HINT: something the user…)? Do you use these? Why or why not?

(Essay)
4.9/5
(32)

List and describe the computer actions you currently take to prevent malware infections on your computer. What other actions could you and should you be taking?

(Essay)
4.7/5
(34)

Per the recommendations in the book, which of the following is NOT something you should do in the event of identity theft?

(Multiple Choice)
4.9/5
(30)

Which of the following is NOT one of the major credit agencies?

(Multiple Choice)
4.7/5
(29)

Which of the following is NOT a computer-based action for preventing malware infections?

(Multiple Choice)
4.9/5
(47)

_____________ searches out all information about you on the internet and presents it to you in the form of a report.

(Multiple Choice)
4.9/5
(32)

__________ helps you detect a Trojan Horse on your computer.

(Multiple Choice)
4.8/5
(30)

Which of the following is NOT a computer-based action for protecting your privacy?

(Multiple Choice)
4.9/5
(36)
Showing 21 - 39 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)