Chapter PI7: Protecting Your Information Assets

  1. Which law limits the use of a person's social security number for identification purposes?
    Social Security Number Protection Act
  2. Within what notification time will a credit card company bear liability for fraudulent charges?
    60 days
  3. A ___ generates a one-time password that you must enter within a specified time limit.
    Token
  4. On a Web browser, "private browsing" mode is one in which...
    The viewing history is not recorded
  5. What is a firewall?
    A software program that controls communications to and from a computer.
  6. Which of the following are computer actions that can be taken to prevent malware infections? There is more than one.
    A) Installing a firewall on your computer
    B) Running hardware diagnostic software on your computer
    C) Updating to a larger hard drive for your computer
    D) Installing a security suite on your computer
    A: Installing a firewall on your computer, D: Installing a security suite on your computer
  7. Which authentication uses both a token/biometric and your personal password?
    Two-face authentication
  8. Why is it best to use a cross-cut shredder to protect your unused documents?
    Cross-cut shredders shred documents more completely
  9. For a two-factor authentication, the first level of authentication required is usually a(n)...
    Biometric token
  10. The benefits of using a proxy server to connect to the Internet are that...
    Your credentials are anonymous to outsiders
  11. How are virtual credit cards different from physical ones?
    The virtual credit card number is used for a limited amount of time.
  12. Are debit cards or credit cards riskier to use for online purchases?
    Debit cards
  13. First-party cookies differ from third-party ones in that they are...
    Sent to the website the user is on.
  14. With regard to data encryption, Wi-Fi Protected Access (WPA2) is ___ than Wireless Equivalent Protocol (WEP).
    Newer
  15. Identity fraud can best be prevented by...
    Limiting the use of debit cards when making purchases in unknown places.
  16. Which of the following do NOT involve a computer-based action you can take to protect your information assets when shopping online? There maybe more than one.
    A) Knowing your credit card billing cycles
    B) Using electronic payments for purchases
    C) Having your picture on your credit card
    D) Installing antivirus software
    A: Knowing your credit card billing cycles, C: Having your picture on your credit card
  17. An example of a computer-based action you can take to protect your information assets would be...
    Never posting personal information on social networking sites
  18. Which of the following is an example of a behavioral action you can take to protect your information assets?
    A) Opening e-mails from people you know and trust
    B) Having your picture on your credit card
    C) Installing antivirus software
    D) Running security checks
    B: Having your picture on your credit card
  19. Which of the following actions would be wise if you were trying to recover from identity theft? There maybe more than one.
    A) Hiring an accountant
    B) Filling out fraud affidavits for creditors
    C) Changing your phone number
    D) Calling your credit card company
    B: Filling out fraud affidavits for creditors, D: Calling your credit card company
  20. What is the worst browser to use for protection from malware infections?
    Internet Explorer
Author
hunter82
ID
318095
Card Set
Chapter PI7: Protecting Your Information Assets
Description
ALSKDFLASKDFJLASKJ
Updated