Filters
Question type

Study Flashcards

If your identity is stolen, what is the first thing you should do?


A) Change all of your credit cards.
B) Get a lawyer.
C) Open a file with all of your paperwork.
D) File a detailed police report.
E) Notify the three major credit-reporting agencies.

Correct Answer

verifed

verified

You should keep close track of your credit card billing cycles.

Correct Answer

verifed

verified

Content-filtering software performs all of the following functions except:


A) Blocking access to undesirable websites
B) Recording all websites visited
C) Proactively monitoring computers to protect against malware attacks
D) Recording both sides of chat conversations
E) Enabling users to selectively filter content

Correct Answer

verifed

verified

You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.

Correct Answer

verifed

verified

False

Using both a token/biometric and your personal password is an example of ________.


A) two-factor authentication
B) two-factor authorization
C) multi-factor authentication
D) multi-factor authorization

Correct Answer

verifed

verified

A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.

Correct Answer

verifed

verified

Companies that provide proactive protection of your personal information allow customers to lock their credit files.

Correct Answer

verifed

verified

A ______ cookie either originates on, or is sent to, the website that you are currently viewing.


A) tracking
B) monitoring
C) second-party
D) third-party
E) first-party

Correct Answer

verifed

verified

___________ is an example of a behavioural action you can take to protect your information assets.


A) Having your picture on your credit card
B) Opening e-mails only from people you know and trust
C) Running security checks
D) Installing antivirus software

Correct Answer

verifed

verified

Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.

Correct Answer

verifed

verified

You should use a post office box for your personal mail.

Correct Answer

verifed

verified

You should ask whether your Social Security Number is necessary for identification or if any combination of nine numbers and letters will do just as well.

Correct Answer

verifed

verified

It is possible for criminals to gain information about many people from social networking sites.

Correct Answer

verifed

verified

_____________ is an example of a behavioural action you can take to protect your information assets.


A) Don't download files/software from websites you don't know or trust
B) Limit your use of debit cards
C) Never post personal information about yourself on social networking sites
D) Update your privacy settings on Facebook, Twitter, etc.

Correct Answer

verifed

verified

Personal firewalls perform all of the following functions except:


A) They should not respond to Internet requests to ports that are not used for common Internet use.
B) They should seek out the origin of malware in an attempt to block it in the future.
C) They should alert you to suspicious behaviour.
D) They should block outbound connections that you do not initiate.
E) They should tell you when a program or connection is attempting to do something that you do not want.

Correct Answer

verifed

verified

It is OK to open an e-mail attachment as long as you know and trust the person who sent the e-mail.

Correct Answer

verifed

verified

List and explain the actions you should take if your identity is stolen.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

If your identity is stolen, there are several important actions you should take to protect yourself and minimize the damage. 1. Contact the authorities: Report the identity theft to the police and file a report. This will create an official record of the crime and may be necessary for resolving any fraudulent accounts or charges. 2. Contact your financial institutions: Notify your bank, credit card companies, and any other financial institutions where you have accounts. They can help you monitor for any suspicious activity and may be able to freeze or close compromised accounts. 3. Place a fraud alert on your credit reports: Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) to place a fraud alert on your credit reports. This will make it more difficult for the thief to open new accounts in your name. 4. Monitor your credit reports: Keep a close eye on your credit reports for any unauthorized activity. You are entitled to a free copy of your credit report from each of the three major credit bureaus once a year. 5. Update your passwords and PINs: Change the passwords and PINs for all of your online accounts, especially those related to your finances and personal information. 6. Consider identity theft protection services: There are companies that offer identity theft protection services, which can help monitor for any suspicious activity and provide assistance in resolving identity theft issues. 7. Be cautious with personal information: Be extra cautious with your personal information, such as your Social Security number, and only share it when absolutely necessary. By taking these actions, you can help protect yourself and minimize the impact of identity theft. It's also important to stay vigilant and continue monitoring your accounts and credit reports for any signs of fraudulent activity.

________________ is an example of a computer-based action you can take to protect your information assets.


A) Never posting personal information about yourself on social networking sites
B) Frequently getting new credit card numbers
C) Not using your "snail-mail" mailbox at home
D) Shredding your documents

Correct Answer

verifed

verified

A

What functions should you expect from content-filtering software on your computer?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Content-filtering software on your compu...

View Answer

Virtual credit cards cannot be used for in-store purchases that require a traditional plastic card.

Correct Answer

verifed

verified

Showing 1 - 20 of 55

Related Exams

Show Answer