Deck 13: Technology Guide 5: Protecting Your Information Assets
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/8
Play
Full screen (f)
Deck 13: Technology Guide 5: Protecting Your Information Assets
1
Which of the following statements about companies that provide proactive protection of your information assets is not correct?
A) These companies allow their customers to lock their credit files.
B) These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C) These companies operate independently of the three major credit reporting agencies.
D) When customers sign up with these companies, merchants and banks must obtain their verbal or written permission before opening new lines of credit in their names.
E) These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
A) These companies allow their customers to lock their credit files.
B) These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C) These companies operate independently of the three major credit reporting agencies.
D) When customers sign up with these companies, merchants and banks must obtain their verbal or written permission before opening new lines of credit in their names.
E) These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
C
2
Your liability with credit cards is typically _____, where your liability with debit cards is _____.
A) The amount in your bank account, your credit limit
B) Your credit limit, the amount in your bank account
C) The amount in your bank account, zero
D) Your credit limit, zero
E) Zero, the amount in your bank account
A) The amount in your bank account, your credit limit
B) Your credit limit, the amount in your bank account
C) The amount in your bank account, zero
D) Your credit limit, zero
E) Zero, the amount in your bank account
E
3
Content-filtering software performs all of the following functions except:
A) It blocks access to undesirable Web sites.
B) It records all Web sites that users have visited.
C) It proactively monitors computers against malware attacks.
D) It records both sides of chat conversations.
E) It enables users to selectively filter content.
A) It blocks access to undesirable Web sites.
B) It records all Web sites that users have visited.
C) It proactively monitors computers against malware attacks.
D) It records both sides of chat conversations.
E) It enables users to selectively filter content.
C
4
Over the years, improved security software has made it progressively more difficult for hackers to get access to potential victim's computers.
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following actions should you take to protect your portable devices and information?
A) Use two-factor authentication.
B) Do not leave your portable devices in plain view in a car.
C) Keep your portable devices in an inconspicuous container.
D) Encrypt the hard drive of your laptop
E) All of these
A) Use two-factor authentication.
B) Do not leave your portable devices in plain view in a car.
C) Keep your portable devices in an inconspicuous container.
D) Encrypt the hard drive of your laptop
E) All of these
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
6
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
A) Tracking
B) Monitoring
C) Second-party
D) Third-party
E) First-party
A) Tracking
B) Monitoring
C) Second-party
D) Third-party
E) First-party
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
7
A _____ offers you the option of shopping online with a disposable credit card number.
A) Credit card
B) Debit card
C) Driver's license
D) Virtual credit card
E) Bank card
A) Credit card
B) Debit card
C) Driver's license
D) Virtual credit card
E) Bank card
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck
8
The only target for cyber criminals are organizations with valuable information such as customer credit card information.
Unlock Deck
Unlock for access to all 8 flashcards in this deck.
Unlock Deck
k this deck