Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Introduction to Information Systems Study Set 1
Quiz 18: Technology Guide 5 Protecting Your Information Assets
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
If your identity is stolen, what is the first thing you should do?
Question 22
Multiple Choice
A(n) __________ is a computer to which you connect, which in turn connects to the website you wish to visit.
Question 23
Multiple Choice
_____________ is an example of a behavioural action you can take to protect your information assets.
Question 24
Multiple Choice
A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
Question 25
Multiple Choice
Which of the following is a good password?
Question 26
Multiple Choice
_____________ is an example of a computer-based action you can take to protect your information assets.
Question 27
Multiple Choice
Methods you should use to protect your portable devices and information include all of the following except:
Question 28
Multiple Choice
___________ is an example of a behavioural action you can take to protect your information assets.
Question 29
Multiple Choice
Which of the following attacks is most closely associated with downloading and installing patches immediately?
Question 30
Multiple Choice
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?