Deck 21: Plug It in 6 Project Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/38
Play
Full screen (f)
Deck 21: Plug It in 6 Project Management
1
It is possible for criminals to gain information about many people from social networking sites.
True
2
You should keep close track of your credit card billing cycles.
True
3
Companies that provide proactive protection of your personal information allow customers to lock their credit files.
True
4
Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.
A)The amount in your bank account, your credit limit
B)Your credit limit, the amount in your bank account
C)The amount in your bank account, zero
D)Your credit limit, zero
E)Zero, the amount in your bank account
A)The amount in your bank account, your credit limit
B)Your credit limit, the amount in your bank account
C)The amount in your bank account, zero
D)Your credit limit, zero
E)Zero, the amount in your bank account
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following statements is false?
A)You should use credit cards with your picture on them.
B)You may use virtual credit cards for additional security.
C)You should use debit cards whenever possible for additional security.
D)You cannot use virtual credit cards for in-store purchases.
E)Signatures on credit cards are often impossible to read.
A)You should use credit cards with your picture on them.
B)You may use virtual credit cards for additional security.
C)You should use debit cards whenever possible for additional security.
D)You cannot use virtual credit cards for in-store purchases.
E)Signatures on credit cards are often impossible to read.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
6
The security considerations for wireless networks are greater than those for wired networks.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
7
If your identity is stolen, what is the first thing you should do?
A)Change all of your credit cards.
B)Get a lawyer.
C)Open a file with all of your paperwork.
D)File a detailed police report.
E)Notify the three major credit-reporting agencies.
A)Change all of your credit cards.
B)Get a lawyer.
C)Open a file with all of your paperwork.
D)File a detailed police report.
E)Notify the three major credit-reporting agencies.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
8
It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
9
You should update your definitions before scanning your system with anti-malware software.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
10
Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
11
A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
12
Social engineering attacks are a threat at work but typically not at home.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following statements about companies that provide proactive protection of your information assets is false?
A)These companies allow their customers to lock their credit files.
B)These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C)These companies operate independently of the three major credit reporting agencies.
D)Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names.
E)These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
A)These companies allow their customers to lock their credit files.
B)These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files.
C)These companies operate independently of the three major credit reporting agencies.
D)Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names.
E)These companies will proactively monitor their clients' credit files at the three credit reporting agencies.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
14
A _____ offers you the option of shopping online with a disposable credit card number.
A)Credit card
B)Debit card
C)Driver's license
D)Virtual credit card
E)Bank card
A)Credit card
B)Debit card
C)Driver's license
D)Virtual credit card
E)Bank card
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
15
One strategy for controlling spam is to set up multiple free e-mail accounts.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
16
You should use a Post Office box for your personal mail.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
17
When you use the private browsing mode on your computer, your search history is recorded and visible only to you.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
18
Victims of identity theft should first and foremost contact the Federal Trade Commission (FTC).
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
19
You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following actions will not help protect your information assets?
A)Using virtual credit cards
B)Limiting the use of debit cards
C)Using your social security number for identification
D)Paying close attention to your credit card billing cycles
A)Using virtual credit cards
B)Limiting the use of debit cards
C)Using your social security number for identification
D)Paying close attention to your credit card billing cycles
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
21
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?
A)It can't be a worm because your anti-malware software would have blocked it.
B)It can't be a Trojan horse because your anti-spam software would have blocked it.
C)It can't be your brother's fault because he only visited Web sites, and he didn't open any files.
D)Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can't be your brother's fault.
E)All of the statements are false.
A)It can't be a worm because your anti-malware software would have blocked it.
B)It can't be a Trojan horse because your anti-spam software would have blocked it.
C)It can't be your brother's fault because he only visited Web sites, and he didn't open any files.
D)Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can't be your brother's fault.
E)All of the statements are false.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
22
A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
A)Tracking
B)Monitoring
C)Second-party
D)Third-party
E)First-party
A)Tracking
B)Monitoring
C)Second-party
D)Third-party
E)First-party
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
23
For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.
A)WPA, WEP
B)WPA2, WPA
C)WEP, WPA
D)WPA2, WEP
E)WEP, WPB
A)WPA, WEP
B)WPA2, WPA
C)WEP, WPA
D)WPA2, WEP
E)WEP, WPB
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
24
Content-filtering software performs all of the following functions except:
A)Blocking access to undesirable Web sites.
B)Recording all Web sites visited.
C)Proactively monitoring computers to protect against malware attacks.
D)Recording both sides of chat conversations.
E)Enabling users to selectively filter content.
A)Blocking access to undesirable Web sites.
B)Recording all Web sites visited.
C)Proactively monitoring computers to protect against malware attacks.
D)Recording both sides of chat conversations.
E)Enabling users to selectively filter content.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)_____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.
A)Proxy server
B)Internet server
C)Intermediate server
D)Backbone server
E)E-mail server
A)Proxy server
B)Internet server
C)Intermediate server
D)Backbone server
E)E-mail server
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
26
Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. After running anti-malware and anti-virus … and cleaning up your laptop … you decide you need something that will do a better job of blocking communications based on security settings. Which of the following statements would you install?
A)Proactive monitoring package
B)Personal firewall
C)Content-filtering package
D)Anti-malware package
E)Anti-spyware package
A)Proactive monitoring package
B)Personal firewall
C)Content-filtering package
D)Anti-malware package
E)Anti-spyware package
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following attacks is most closely associated with downloading and installing patches immediately?
A)Denial-of-service
B)Zero-day attacks
C)Distributed denial-of-service
D)Viruses
E)Worms
A)Denial-of-service
B)Zero-day attacks
C)Distributed denial-of-service
D)Viruses
E)Worms
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a bad password?
A)The acronym for the title of your favorite song plus the year it came out.
B)The month of your birthdate and your first name with alternate letters capitalized
C)Your first pet's name with the number 1 between each letter.
D)Your last name and the number of your house on your street
E)Your social security number
A)The acronym for the title of your favorite song plus the year it came out.
B)The month of your birthdate and your first name with alternate letters capitalized
C)Your first pet's name with the number 1 between each letter.
D)Your last name and the number of your house on your street
E)Your social security number
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
29
You got careless and left your laptop in a taxi back from the airport. You are very worried about the security of the data because your operating system does not require a password at start-up. Which of the following will give you some measure of comfort?
A)You back up all your files every Monday night.
B)You encrypt all of your personal information.
C)You use a special naming convention for your folder names.
D)You have trace software on your laptop.
A)You back up all your files every Monday night.
B)You encrypt all of your personal information.
C)You use a special naming convention for your folder names.
D)You have trace software on your laptop.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
30
You got careless and left your laptop in a taxi back from the airport. However, you aren't too worried about your information because you have been proactive. Which of the following is not one of your proactive actions?
A)You back up all your files every Monday night. b)You encrypt all of your personal information.
C)Your operating system requires a password at start-up.
D)You have trace software on your laptop.
E)You named the file that contains your list of passwords "BirthdaysToRemember".
A)You back up all your files every Monday night. b)You encrypt all of your personal information.
C)Your operating system requires a password at start-up.
D)You have trace software on your laptop.
E)You named the file that contains your list of passwords "BirthdaysToRemember".
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
31
A(n)___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.
A)Proactive monitoring package
B)Anti-spyware package
C)Content-filtering package
D)Anti-malware package
E)Personal firewall
A)Proactive monitoring package
B)Anti-spyware package
C)Content-filtering package
D)Anti-malware package
E)Personal firewall
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
32
A _____ cookie either originates on, or is sent to, a different Web site than the one you are currently viewing.
A)Tracking cookie
B)Monitoring cookie
C)Second-party cookie
D)Third-party cookie
E)First-party cookie
A)Tracking cookie
B)Monitoring cookie
C)Second-party cookie
D)Third-party cookie
E)First-party cookie
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
33
Personal firewalls perform all of the following functions except:
A)They should not respond to Internet requests to ports that are not used for common Internet use.
B)They should seek out the origin of malware in an attempt to block it in the future.
C)They should alert you to suspicious behavior.
D)They should block outbound connections that you do not initiate.
E)They should tell you when a program or connection is attempting to do something that you do not want.
A)They should not respond to Internet requests to ports that are not used for common Internet use.
B)They should seek out the origin of malware in an attempt to block it in the future.
C)They should alert you to suspicious behavior.
D)They should block outbound connections that you do not initiate.
E)They should tell you when a program or connection is attempting to do something that you do not want.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?
A)Anti-malware software is reactive.
B)This software reduces your vulnerability to zero-day attacks.
C)Anti-malware software requires you to update malware signatures on a regular basis.
D)This software reduces your vulnerability to distributed denial-of-service attacks.
E)None of these
A)Anti-malware software is reactive.
B)This software reduces your vulnerability to zero-day attacks.
C)Anti-malware software requires you to update malware signatures on a regular basis.
D)This software reduces your vulnerability to distributed denial-of-service attacks.
E)None of these
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
35
Methods you should use to protect your portable devices and information include all of the following except:
A)Using two-factor authentication.
B)Making certain not to leave your portable devices in plain view in a car.
C)Keeping your portable devices in an inconspicuous container.
D)Encrypting the hard drive of your laptop.
E)All of the above are legitimate protection methods.
A)Using two-factor authentication.
B)Making certain not to leave your portable devices in plain view in a car.
C)Keeping your portable devices in an inconspicuous container.
D)Encrypting the hard drive of your laptop.
E)All of the above are legitimate protection methods.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
36
Anti- Malware programs need to be run once a year.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
37
You are going on a business trip. Which of the following would be the worst type of card to take?
A)Credit card (Visa, MasterCard, American Express, etc.)
B)Debit card
C)Virtual credit card.
D)Bank card
A)Credit card (Visa, MasterCard, American Express, etc.)
B)Debit card
C)Virtual credit card.
D)Bank card
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
38
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.
A)Firewall
B)Anti-malware
C)Monitoring
D)Content-filtering
E)Anti-spyware
A)Firewall
B)Anti-malware
C)Monitoring
D)Content-filtering
E)Anti-spyware
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck