Deck 13: Technology Guide 5: Protecting Your Information Assets

ملء الشاشة (f)
exit full mode
سؤال
Which of the following statements about companies that provide proactive protection of your information assets is not correct?

A) These companies allow their customers to lock their credit files.
B) These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C) These companies operate independently of the three major credit reporting agencies.
D) When customers sign up with these companies, merchants and banks must obtain their verbal or written permission before opening new lines of credit in their names.
E) These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Your liability with credit cards is typically _____, where your liability with debit cards is _____.

A) The amount in your bank account, your credit limit
B) Your credit limit, the amount in your bank account
C) The amount in your bank account, zero
D) Your credit limit, zero
E) Zero, the amount in your bank account
سؤال
Content-filtering software performs all of the following functions except:

A) It blocks access to undesirable Web sites.
B) It records all Web sites that users have visited.
C) It proactively monitors computers against malware attacks.
D) It records both sides of chat conversations.
E) It enables users to selectively filter content.
سؤال
Over the years, improved security software has made it progressively more difficult for hackers to get access to potential victim's computers.
سؤال
Which of the following actions should you take to protect your portable devices and information?

A) Use two-factor authentication.
B) Do not leave your portable devices in plain view in a car.
C) Keep your portable devices in an inconspicuous container.
D) Encrypt the hard drive of your laptop
E) All of these
سؤال
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

A) Tracking
B) Monitoring
C) Second-party
D) Third-party
E) First-party
سؤال
A _____ offers you the option of shopping online with a disposable credit card number.

A) Credit card
B) Debit card
C) Driver's license
D) Virtual credit card
E) Bank card
سؤال
The only target for cyber criminals are organizations with valuable information such as customer credit card information.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/8
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 13: Technology Guide 5: Protecting Your Information Assets
1
Which of the following statements about companies that provide proactive protection of your information assets is not correct?

A) These companies allow their customers to lock their credit files.
B) These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C) These companies operate independently of the three major credit reporting agencies.
D) When customers sign up with these companies, merchants and banks must obtain their verbal or written permission before opening new lines of credit in their names.
E) These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
C
2
Your liability with credit cards is typically _____, where your liability with debit cards is _____.

A) The amount in your bank account, your credit limit
B) Your credit limit, the amount in your bank account
C) The amount in your bank account, zero
D) Your credit limit, zero
E) Zero, the amount in your bank account
E
3
Content-filtering software performs all of the following functions except:

A) It blocks access to undesirable Web sites.
B) It records all Web sites that users have visited.
C) It proactively monitors computers against malware attacks.
D) It records both sides of chat conversations.
E) It enables users to selectively filter content.
C
4
Over the years, improved security software has made it progressively more difficult for hackers to get access to potential victim's computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following actions should you take to protect your portable devices and information?

A) Use two-factor authentication.
B) Do not leave your portable devices in plain view in a car.
C) Keep your portable devices in an inconspicuous container.
D) Encrypt the hard drive of your laptop
E) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
6
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

A) Tracking
B) Monitoring
C) Second-party
D) Third-party
E) First-party
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
7
A _____ offers you the option of shopping online with a disposable credit card number.

A) Credit card
B) Debit card
C) Driver's license
D) Virtual credit card
E) Bank card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
8
The only target for cyber criminals are organizations with valuable information such as customer credit card information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 8 في هذه المجموعة.