Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Introduction to Information Systems Study Set 1
Quiz 18: Technology Guide 5 Protecting Your Information Assets
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
If your identity is stolen, what is the first thing you should do?
Question 22
Multiple Choice
A(n) __________ is a computer to which you connect, which in turn connects to the website you wish to visit.
Question 23
Multiple Choice
_____________ is an example of a behavioural action you can take to protect your information assets.
Question 24
Multiple Choice
A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
Question 25
Multiple Choice
Which of the following is a good password?
Question 26
Multiple Choice
_____________ is an example of a computer-based action you can take to protect your information assets.
Question 27
Multiple Choice
Methods you should use to protect your portable devices and information include all of the following except:
Question 28
Multiple Choice
___________ is an example of a behavioural action you can take to protect your information assets.
Question 29
Multiple Choice
Which of the following attacks is most closely associated with downloading and installing patches immediately?
Question 30
Multiple Choice
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?
Question 31
Multiple Choice
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?
Question 32
Multiple Choice
A _______ cookie either originates on, or is sent to, a different website than the one you are currently viewing.
Question 33
Multiple Choice
Personal firewalls perform all of the following functions except:
Question 34
Multiple Choice
_______ software logs keystrokes, e-mails, applications, windows, websites, Internet connection, passwords, chat conversations, webcams, and screenshots.
Question 35
Multiple Choice
You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information. Which of the following should not be a reason for your attitude?