Deck 18: Tech Guide 5: Protecting your information assets

ملء الشاشة (f)
exit full mode
سؤال
As businesses improve their information security, organized crime is turning its attention to consumers.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Companies that provide proactive protection of your personal information allow customers to lock their credit files.
سؤال
A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
سؤال
One strategy for controlling spam is to set up multiple free e-mail accounts.
سؤال
Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.
سؤال
Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft.
سؤال
It is possible for criminals to gain information about many people from social networking sites.
سؤال
You should ask whether your Social Security number is necessary for identification or if any combination of nine numbers and letters will do just as well.
سؤال
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
سؤال
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.

A)The amount in your bank account, your credit limit
B)Your credit limit, the amount in your bank account
C)The amount in your bank account, zero
D)Your credit limit, zero
E)Zero, the amount in your bank account
سؤال
You should update your definitions before scanning your system with anti-malware software.
سؤال
Social engineering attacks are a threat at work but typically not at home.
سؤال
It is best to use a straight-line shredder to protect your unused documents.
سؤال
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
سؤال
Using credit cards with your face on them will decrease your information security because clerks will look for your signature.
سؤال
You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.
سؤال
Which of the following statements is not correct?

A)You should use credit cards with your picture on them.
B)You may use virtual credit cards for additional security.
C)You should use debit cards whenever possible for additional security.
D)You cannot use virtual credit cards for in-store purchases.
E)Signatures on credit cards are often impossible to read.
سؤال
You should use a Post Office box for your personal mail.
سؤال
A _____ offers you the option of shopping online with a disposable credit card number.

A)Credit card
B)Debit card
C)Driver's license
D)Virtual credit card
E)Bank card
سؤال
You should keep close track of your credit card billing cycles.
سؤال
A(n)_____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.

A)Proxy server
B)Internet server
C)Intermediate server
D)Backbone server
E)E-mail server
سؤال
_____________ is an example of a behavioral action you can take to protect your information assets.

A)Having your picture on your credit card
B)Opening e-mails only from people you know and trust
C)Running security checks
D)Installing antivirus software
سؤال
Which of the following attacks is most closely associated with downloading and installing patches immediately?

A)Denial-of-service
B)Zero-day attacks
C)Distributed denial-of-service
D)Viruses
E)Worms
سؤال
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.

A)Tracking cookie
B)Monitoring cookie
C)Second-party cookie
D)Third-party cookie
E)First-party cookie
سؤال
_____________ is an example of a behavioral action you can take to protect your information assets.

A)Don't download files/software from web sites you don't know or trust
B)Limit your use of debit cards
C)Never post personal information about yourself on social networking sites
D)Update your privacy settings on Facebook, Twitter, etc.
سؤال
The first step to recover from identity theft is ____________.

A)call your credit card company
B)change all your credit cards
C)get a lawyer
D)fill out fraud affidavits for creditors
سؤال
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?

A)Anti-malware software is reactive.
B)This software reduces your vulnerability to zero-day attacks.
C)Anti-malware software requires you to update malware signatures on a regular basis.
D)This software reduces your vulnerability to distributed denial-of-service attacks.
E)None of these
سؤال
Which of the following statements about companies that provide proactive protection of your information assets is not correct?

A)These companies allow their customers to lock their credit files.
B)These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C)These companies operate independently of the three major credit reporting agencies.
D)Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names.
E)These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
سؤال
Personal firewalls perform all of the following functions except:

A)They should not respond to Internet requests to ports that are not used for common Internet use.
B)They should seek out the origin of malware in an attempt to block it in the future.
C)They should alert you to suspicious behavior.
D)They should block outbound connections that you do not initiate.
E)They should tell you when a program or connection is attempting to do something that you do not want.
سؤال
Your little brother came for a visit and used your laptop.You didn't think anything of it at the time, but now your laptop is running really slow.Which of the following statements is false?

A)It can't be a worm because your anti-malware software would have blocked it.
B)It can't be a Trojan horse because your anti-spam software would have blocked it.
C)It can't be your brother's fault because he only visited Web sites, and he didn't open any files.
D)Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can't be your brother's fault.
E)All of these statements are false.
سؤال
Which of the following is a good password?

A)Your last name
B)Your birth date
C)Your mother's name and her birth date
D)Your driver's license number
E)Your social security number
سؤال
Content-filtering software performs all of the following functions except:

A)Blocking access to undesirable Web sites.
B)Recording all Web sites visited.
C)Proactively monitoring computers to protect against malware attacks.
D)Recording both sides of chat conversations.
E)Enabling users to selectively filter content.
سؤال
If your identity is stolen, what is the first thing you should do?

A)Change all of your credit cards.
B)Get a lawyer.
C)Open a file with all of your paperwork.
D)File a detailed police report.
E)Notify the three major credit-reporting agencies.
سؤال
You got careless and left your laptop in a taxi back from the airport.However, you aren't too worried about your information.Which of the following should not a reason for your attitude?

A)You back up all your files every Monday night.
B)You encrypt all of your personal information.
C)Your operating system requires a password at start-up.
D)You have trace software on your laptop.
E)You named the file that contains your list of passwords BirthdaysToRemember.
سؤال
Methods you should use to protect your portable devices and information include all of the following except:

A)Using two-factor authentication.
B)Making certain not to leave your portable devices in plain view in a car.
C)Keeping your portable devices in an inconspicuous container.
D)Encrypting the hard drive of your laptop.
E)All of these are legitimate protection methods.
سؤال
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.

A)Firewall
B)Anti-malware
C)Monitoring
D)Content-filtering
E)Anti-spyware
سؤال
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.

A)WPA, WEP
B)WPA2, WPA
C)WEP, WPA
D)WPA2, WEP
E)WEP, WPB
سؤال
A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.

A)Proactive monitoring package
B)Anti-spyware package
C)Content-filtering package
D)Anti-malware package
E)Personal firewall
سؤال
_____________ is an example of a computer-based action you can take to protect your information assets.

A)Having your picture on your credit card
B)Limiting your use of debit cards
C)Knowing your credit card billing cycles
D)Installing antivirus software
سؤال
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

A)Tracking
B)Monitoring
C)Second-party
D)Third-party
E)First-party
سؤال
The worst browser to use to protect yourself from malware infections is ________.

A)Chrome
B)Firefox
C)Internet Explorer
D)Opera
سؤال
Which of the following is a computer action you can take to prevent malware infections?

A)Install a security suite on your computer
B)Install a firewall on your computer
C)Install monitoring software on your computer
D)All of the above
سؤال
Using both a token/biometric and your personal password is an example of ________.

A)Two-factor authentication
B)Two-factor authorization
C)Multi-factor authentication
D)Multi-factor authorization
سؤال
________________ is an example of a computer-based action you can take to protect your information assets.

A)Never posting personal information about yourself on social networking sites
B)Frequently getting new credit card numbers
C)Not using your "snail-mail" mailbox at home
D)Shredding your documents
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/44
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 18: Tech Guide 5: Protecting your information assets
1
As businesses improve their information security, organized crime is turning its attention to consumers.
True
2
Companies that provide proactive protection of your personal information allow customers to lock their credit files.
True
3
A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
False
4
One strategy for controlling spam is to set up multiple free e-mail accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
5
Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
6
Credit card companies bear the liability for fraudulent charges, provided that they are notified within 60 days of the theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
7
It is possible for criminals to gain information about many people from social networking sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
8
You should ask whether your Social Security number is necessary for identification or if any combination of nine numbers and letters will do just as well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
9
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
10
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.

A)The amount in your bank account, your credit limit
B)Your credit limit, the amount in your bank account
C)The amount in your bank account, zero
D)Your credit limit, zero
E)Zero, the amount in your bank account
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
11
You should update your definitions before scanning your system with anti-malware software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
12
Social engineering attacks are a threat at work but typically not at home.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
13
It is best to use a straight-line shredder to protect your unused documents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
14
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
15
Using credit cards with your face on them will decrease your information security because clerks will look for your signature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
16
You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following statements is not correct?

A)You should use credit cards with your picture on them.
B)You may use virtual credit cards for additional security.
C)You should use debit cards whenever possible for additional security.
D)You cannot use virtual credit cards for in-store purchases.
E)Signatures on credit cards are often impossible to read.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
18
You should use a Post Office box for your personal mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
19
A _____ offers you the option of shopping online with a disposable credit card number.

A)Credit card
B)Debit card
C)Driver's license
D)Virtual credit card
E)Bank card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
20
You should keep close track of your credit card billing cycles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n)_____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.

A)Proxy server
B)Internet server
C)Intermediate server
D)Backbone server
E)E-mail server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
22
_____________ is an example of a behavioral action you can take to protect your information assets.

A)Having your picture on your credit card
B)Opening e-mails only from people you know and trust
C)Running security checks
D)Installing antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following attacks is most closely associated with downloading and installing patches immediately?

A)Denial-of-service
B)Zero-day attacks
C)Distributed denial-of-service
D)Viruses
E)Worms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
24
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.

A)Tracking cookie
B)Monitoring cookie
C)Second-party cookie
D)Third-party cookie
E)First-party cookie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____________ is an example of a behavioral action you can take to protect your information assets.

A)Don't download files/software from web sites you don't know or trust
B)Limit your use of debit cards
C)Never post personal information about yourself on social networking sites
D)Update your privacy settings on Facebook, Twitter, etc.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
26
The first step to recover from identity theft is ____________.

A)call your credit card company
B)change all your credit cards
C)get a lawyer
D)fill out fraud affidavits for creditors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?

A)Anti-malware software is reactive.
B)This software reduces your vulnerability to zero-day attacks.
C)Anti-malware software requires you to update malware signatures on a regular basis.
D)This software reduces your vulnerability to distributed denial-of-service attacks.
E)None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following statements about companies that provide proactive protection of your information assets is not correct?

A)These companies allow their customers to lock their credit files.
B)These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C)These companies operate independently of the three major credit reporting agencies.
D)Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names.
E)These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
29
Personal firewalls perform all of the following functions except:

A)They should not respond to Internet requests to ports that are not used for common Internet use.
B)They should seek out the origin of malware in an attempt to block it in the future.
C)They should alert you to suspicious behavior.
D)They should block outbound connections that you do not initiate.
E)They should tell you when a program or connection is attempting to do something that you do not want.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
30
Your little brother came for a visit and used your laptop.You didn't think anything of it at the time, but now your laptop is running really slow.Which of the following statements is false?

A)It can't be a worm because your anti-malware software would have blocked it.
B)It can't be a Trojan horse because your anti-spam software would have blocked it.
C)It can't be your brother's fault because he only visited Web sites, and he didn't open any files.
D)Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can't be your brother's fault.
E)All of these statements are false.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is a good password?

A)Your last name
B)Your birth date
C)Your mother's name and her birth date
D)Your driver's license number
E)Your social security number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
32
Content-filtering software performs all of the following functions except:

A)Blocking access to undesirable Web sites.
B)Recording all Web sites visited.
C)Proactively monitoring computers to protect against malware attacks.
D)Recording both sides of chat conversations.
E)Enabling users to selectively filter content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
33
If your identity is stolen, what is the first thing you should do?

A)Change all of your credit cards.
B)Get a lawyer.
C)Open a file with all of your paperwork.
D)File a detailed police report.
E)Notify the three major credit-reporting agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
34
You got careless and left your laptop in a taxi back from the airport.However, you aren't too worried about your information.Which of the following should not a reason for your attitude?

A)You back up all your files every Monday night.
B)You encrypt all of your personal information.
C)Your operating system requires a password at start-up.
D)You have trace software on your laptop.
E)You named the file that contains your list of passwords BirthdaysToRemember.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
35
Methods you should use to protect your portable devices and information include all of the following except:

A)Using two-factor authentication.
B)Making certain not to leave your portable devices in plain view in a car.
C)Keeping your portable devices in an inconspicuous container.
D)Encrypting the hard drive of your laptop.
E)All of these are legitimate protection methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
36
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.

A)Firewall
B)Anti-malware
C)Monitoring
D)Content-filtering
E)Anti-spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
37
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.

A)WPA, WEP
B)WPA2, WPA
C)WEP, WPA
D)WPA2, WEP
E)WEP, WPB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
38
A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.

A)Proactive monitoring package
B)Anti-spyware package
C)Content-filtering package
D)Anti-malware package
E)Personal firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
39
_____________ is an example of a computer-based action you can take to protect your information assets.

A)Having your picture on your credit card
B)Limiting your use of debit cards
C)Knowing your credit card billing cycles
D)Installing antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
40
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.

A)Tracking
B)Monitoring
C)Second-party
D)Third-party
E)First-party
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
41
The worst browser to use to protect yourself from malware infections is ________.

A)Chrome
B)Firefox
C)Internet Explorer
D)Opera
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is a computer action you can take to prevent malware infections?

A)Install a security suite on your computer
B)Install a firewall on your computer
C)Install monitoring software on your computer
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
43
Using both a token/biometric and your personal password is an example of ________.

A)Two-factor authentication
B)Two-factor authorization
C)Multi-factor authentication
D)Multi-factor authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
44
________________ is an example of a computer-based action you can take to protect your information assets.

A)Never posting personal information about yourself on social networking sites
B)Frequently getting new credit card numbers
C)Not using your "snail-mail" mailbox at home
D)Shredding your documents
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.