Exam 20: Plug It in 7 Protecting Your Information Assets
Exam 1: Introduction to Information Systems76 Questions
Exam 2: Organizational Strategy, Competitive Advantage, and Information Systems92 Questions
Exam 3: Data and Knowledge Management95 Questions
Exam 4: Telecommunications and Networking90 Questions
Exam 5: Business Analytics83 Questions
Exam 6: Ethics and Privacy89 Questions
Exam 7: Information Security98 Questions
Exam 8: Social Computing87 Questions
Exam 9: E-Business and E-Commerce101 Questions
Exam 10: Wireless, Mobile Computing, and Mobile Commerce88 Questions
Exam 11: Information Systems Within the Organization84 Questions
Exam 12: Customer Relationship Management74 Questions
Exam 13: Supply Chain Management77 Questions
Exam 14: Acquiring Information Systems and Applications90 Questions
Exam 15: Plug It in 1 Business Processes and Business Process Management64 Questions
Exam 16: Plug It in 2 Hardware and Soft Ware81 Questions
Exam 17: Plug It in 4 Cloud Computing70 Questions
Exam 18: Plug It in 5 Artificial Intelligence46 Questions
Exam 19: Plug It in 6 Project Management55 Questions
Exam 20: Plug It in 7 Protecting Your Information Assets39 Questions
Select questions type
Which of the following is NOT a computer-based action for preventing malware infections?
(Multiple Choice)
4.9/5
(30)
Which of the following is NOT a mobile device best practice?
(Multiple Choice)
4.9/5
(42)
Many employers search social networking sites for information on potential employees.
(True/False)
4.9/5
(37)
According to Symantec, if you connected an unprotected PC to the internet in 2003, it would have been attacked within 15 minutes; today, that same computer would be attacked within seconds.
(True/False)
4.9/5
(36)
List and describe the behavioral actions you currently take to protect your assets. What other actions could you and should you be taking?
(Essay)
4.8/5
(45)
Which of the following is NOT a computer-based action that can establish wireless security?
(Multiple Choice)
4.9/5
(32)
Which of the following is NOT a mobile device best practice?
(Multiple Choice)
4.8/5
(35)
Which of the following is NOT a behavioral action for protecting your assets?
(Multiple Choice)
4.9/5
(33)
Which of the following is NOT a computer-based action that can establish wireless security?
(Multiple Choice)
4.9/5
(38)
Using cross-cut or confetti shredding to discard mail or old records helps protect you against __________.
(Multiple Choice)
4.9/5
(26)
What authentication factors are available on your portable electronic devices (HINT: something the user…)? Do you use these? Why or why not?
(Essay)
4.9/5
(32)
List and describe the computer actions you currently take to prevent malware infections on your computer. What other actions could you and should you be taking?
(Essay)
4.7/5
(34)
Per the recommendations in the book, which of the following is NOT something you should do in the event of identity theft?
(Multiple Choice)
4.9/5
(30)
Which of the following is NOT one of the major credit agencies?
(Multiple Choice)
4.7/5
(29)
Which of the following is NOT a computer-based action for preventing malware infections?
(Multiple Choice)
4.9/5
(47)
_____________ searches out all information about you on the internet and presents it to you in the form of a report.
(Multiple Choice)
4.9/5
(32)
__________ helps you detect a Trojan Horse on your computer.
(Multiple Choice)
4.8/5
(30)
Which of the following is NOT a computer-based action for protecting your privacy?
(Multiple Choice)
4.9/5
(36)
Showing 21 - 39 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)