Chapter PI7: Protecting Your Information Assets
Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
Which law limits the use of a person's social security number for identification purposes?
Social Security Number Protection Act
Within what notification time will a credit card company bear liability for fraudulent charges?
A ___ generates a one-time password that you must enter within a specified time limit.
On a Web browser, "private browsing" mode is one in which...
The viewing history is not recorded
What is a firewall?
A software program that controls communications to and from a computer.
Which of the following are computer actions that can be taken to prevent malware infections? There is more than one.
A) Installing a firewall on your computer
B) Running hardware diagnostic software on your computer
C) Updating to a larger hard drive for your computer
D) Installing a security suite on your computer
A: Installing a firewall on your computer, D: Installing a security suite on your computer
Which authentication uses both a token/biometric and your personal password?
Why is it best to use a cross-cut shredder to protect your unused documents?
Cross-cut shredders shred documents more completely
For a two-factor authentication, the first level of authentication required is usually a(n)...
The benefits of using a proxy server to connect to the Internet are that...
Your credentials are anonymous to outsiders
How are virtual credit cards different from physical ones?
The virtual credit card number is used for a limited amount of time.
Are debit cards or credit cards riskier to use for online purchases?
First-party cookies differ from third-party ones in that they are...
Sent to the website the user is on.
With regard to data encryption, Wi-Fi Protected Access (WPA2) is ___ than Wireless Equivalent Protocol (WEP).
Identity fraud can best be prevented by...
Limiting the use of debit cards when making purchases in unknown places.
Which of the following do NOT involve a computer-based action you can take to protect your information assets when shopping online? There maybe more than one.
A) Knowing your credit card billing cycles
B) Using electronic payments for purchases
C) Having your picture on your credit card
D) Installing antivirus software
A: Knowing your credit card billing cycles, C: Having your picture on your credit card
An example of a computer-based action you can take to protect your information assets would be...
Never posting personal information on social networking sites
Which of the following is an example of a behavioral action you can take to protect your information assets?
A) Opening e-mails from people you know and trust
B) Having your picture on your credit card
C) Installing antivirus software
D) Running security checks
B: Having your picture on your credit card
Which of the following actions would be wise if you were trying to recover from identity theft? There maybe more than one.
A) Hiring an accountant
B) Filling out fraud affidavits for creditors
C) Changing your phone number
D) Calling your credit card company
B: Filling out fraud affidavits for creditors, D: Calling your credit card company
What is the worst browser to use for protection from malware infections?
Home > Flashcards > Print Preview