Deck 20: Plug It in 7 Protecting Your Information Assets
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
Play
Full screen (f)
Deck 20: Plug It in 7 Protecting Your Information Assets
1
Which of the following is NOT a computer-based action for protecting your privacy?
A) adjust your privacy settings on your computer
B) don't use personal mailboxes (use a PO box)
C) surf the web anonymously
D) use strong passwords
A) adjust your privacy settings on your computer
B) don't use personal mailboxes (use a PO box)
C) surf the web anonymously
D) use strong passwords
B
2
You should limit your use of ___________ cards as a behavioral action to protect your assets.
A) Credit
B) Debit
C) Smart
D) Stored value money
A) Credit
B) Debit
C) Smart
D) Stored value money
B
3
Your laptop computer ___________ is NOT a sign that your computer may be infected with malware.
A) does not start normally
B) exhibits erratic behavior
C) has a shorter battery life
D) shuts down unexpectedly by itself
A) does not start normally
B) exhibits erratic behavior
C) has a shorter battery life
D) shuts down unexpectedly by itself
C
4
__________ helps you detect a Trojan Horse on your computer.
A) LifeLock
B) Netstat
C) SpoofStick
D) Unexplained hard disk activity
A) LifeLock
B) Netstat
C) SpoofStick
D) Unexplained hard disk activity
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
_____________ searches out all information about you on the internet and presents it to you in the form of a report.
A) LifeLock
B) Reputation Defender
C) Transunion
D) TrustedID
A) LifeLock
B) Reputation Defender
C) Transunion
D) TrustedID
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
To protect your information and greatly reduce your exposure to fraud and identity theft, you need to take ___________ actions.
A) behavioral
B) computer-based
C) both behavioral and computer-based
D) neither behavioral or computer-based since IT should manage these issues
A) behavioral
B) computer-based
C) both behavioral and computer-based
D) neither behavioral or computer-based since IT should manage these issues
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
Behavioral actions help protect you against ______________.
A) Cyberterrorism
B) Dumpster diving
C) Sabotage
D) Social engineering
A) Cyberterrorism
B) Dumpster diving
C) Sabotage
D) Social engineering
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
Using cross-cut or confetti shredding to discard mail or old records helps protect you against __________.
A) Cyberterrorism
B) Dumpster diving
C) Sabotage
D) Social engineering
A) Cyberterrorism
B) Dumpster diving
C) Sabotage
D) Social engineering
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT a behavioral action for protecting your assets?
A) don't click on links in e-mails
B) don't provide personal information
C) use a browser other than Internet Explorer
D) use virtual credit cards
A) don't click on links in e-mails
B) don't provide personal information
C) use a browser other than Internet Explorer
D) use virtual credit cards
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT a computer-based action for preventing malware infections?
A) install a security suite on your computer
B) manage patches
C) test your system
D) use virtual credit cards
A) install a security suite on your computer
B) manage patches
C) test your system
D) use virtual credit cards
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT a computer-based action for protecting your privacy?
A) don't use your social security number for identification
B) e-mail anonymously
C) erasing your Google search history
D) use strong passwords
A) don't use your social security number for identification
B) e-mail anonymously
C) erasing your Google search history
D) use strong passwords
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
__________________ proactively monitors your various credit files.
A) Equifax
B) Experian
C) LifeLock
D) Transunion
A) Equifax
B) Experian
C) LifeLock
D) Transunion
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT one of the major credit agencies?
A) Equifax
B) Experian
C) LifeLock
D) Transunion
A) Equifax
B) Experian
C) LifeLock
D) Transunion
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT a computer-based action for preventing malware infections?
A) don't use your social security number for identification
B) install an anti-malware product on your computer
C) manage patches
D) use an operating system other than Windows
A) don't use your social security number for identification
B) install an anti-malware product on your computer
C) manage patches
D) use an operating system other than Windows
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT a computer-based action for preventing malware infections?
A) don't click on links in e-mails
B) install monitoring software on your computer
C) use a browser other than Internet Explorer
D) use an operating system other than Windows
A) don't click on links in e-mails
B) install monitoring software on your computer
C) use a browser other than Internet Explorer
D) use an operating system other than Windows
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT a behavioral action for protecting your assets?
A) don't use personal mailboxes (use a PO box)
B) don't use your social security number for identification
C) know your credit card billing cycle
D) use strong passwords
A) don't use personal mailboxes (use a PO box)
B) don't use your social security number for identification
C) know your credit card billing cycle
D) use strong passwords
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
__________ helps you detect a fake web site.
A) LifeLock
B) Netstat
C) SpoofStick
D) Unexplained hard disk activity
A) LifeLock
B) Netstat
C) SpoofStick
D) Unexplained hard disk activity
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
__________ helps you detect a worm on your computer.
A) LifeLock
B) Netstat
C) SpoofStick
D) Unexplained hard disk activity
A) LifeLock
B) Netstat
C) SpoofStick
D) Unexplained hard disk activity
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
Per the recommendations in the book, which of the following is NOT something you should do in the event of identity theft?
A) Create an Identity Theft Report
B) Get a Lawyer
C) Go to the police
D) Place an Initial Fraud Alert
A) Create an Identity Theft Report
B) Get a Lawyer
C) Go to the police
D) Place an Initial Fraud Alert
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is NOT a recommendation the book provides for protecting your portable devices?
A) Something the user is
B) Something the user has
C) Something the user does
D) Something the user knows
A) Something the user is
B) Something the user has
C) Something the user does
D) Something the user knows
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is NOT a computer-based action that can establish wireless security?
A) hid your SSID
B) install content-filtering software on your computer
C) install wireless security software
D) test your wireless network
A) hid your SSID
B) install content-filtering software on your computer
C) install wireless security software
D) test your wireless network
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is NOT a mobile device best practice?
A) don't use your social security number for identification
B) keep an encrypted backup of information
C) use a strong password
D) use the auto-lock feature on your device
A) don't use your social security number for identification
B) keep an encrypted backup of information
C) use a strong password
D) use the auto-lock feature on your device
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
According to Symantec, if you connected an unprotected PC to the internet in 2003, it would have been attacked within 15 minutes; today, that same computer would be attacked within seconds.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Privacy settings on social networking sites are always easy to find and use.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
You can always click on links in e-mails from your bank, your college, or your friends.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is NOT a mobile device best practice?
A) be careful with apps you download
B) keep your operating systems updated
C) limit IP addresses
D) restrict sharing of GPS-based information
A) be careful with apps you download
B) keep your operating systems updated
C) limit IP addresses
D) restrict sharing of GPS-based information
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
___________________ actions are those actions that do not specifically involve a computer but help protect your information and greatly reduce your exposure to fraud and identity theft.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is NOT a computer-based action that can establish wireless security?
A) filter out MAC addresses
B) hid your SSID
C) use a browser other than Internet Explorer
D) use encryption
A) filter out MAC addresses
B) hid your SSID
C) use a browser other than Internet Explorer
D) use encryption
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
Many employers search social networking sites for information on potential employees.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
List and describe the behavioral actions you currently take to protect your assets. What other actions could you and should you be taking?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is NOT a computer-based action that can establish wireless security?
A) be careful when using a public hotpot
B) limit IP addresses
C) sniff out intruders
D) use the auto-lock feature on your device
A) be careful when using a public hotpot
B) limit IP addresses
C) sniff out intruders
D) use the auto-lock feature on your device
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
The Social Security Number Protection Act of 2007 restricts the use of Social Security numbers for identification purposes.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
_________________________________ actions relate to safe computing and help protect your information and greatly reduce your exposure to fraud and identity theft.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
List and describe the computer actions you currently take to prevent malware infections on your computer. What other actions could you and should you be taking?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
Computer-based actions are the most important ones you can take to protect your information and to greatly reduce your exposure to fraud and identity theft.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
The default on LinkedIn is a public profile; this is generally acceptable since users share professional credentials rather than social information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
What authentication factors are available on your portable electronic devices (HINT: something the user…)? Do you use these? Why or why not?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
List and describe the actions you currently take to ensure the security of your smartphone. What other actions could you and should you be taking?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
You can eliminate the chances that your identity will be stolen by addressing your behavioral and computer-based actions.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck