Filters
Question type

Study Flashcards

When you use the private browsing mode on your computer, your search history is recorded and visible only to you.

Correct Answer

verifed

verified

Your credit card company bears the liability for fraudulent charges, regardless of when you notify them.

Correct Answer

verifed

verified

For security in your wireless computing, you should use the _____ encryption standard, rather than the older _____ encryption standard.


A) WPA, WEP
B) WPA2, WPA
C) WEP, WPA
D) WPA2, WEP
E) WEP, WPB

Correct Answer

verifed

verified

Your liability with credit cards is typically _____, whereas your liability with debit cards is _____.


A) The amount in your bank account, your credit limit
B) Your credit limit, the amount in your bank account
C) The amount in your bank account, zero
D) Your credit limit, zero
E) Zero, the amount in your bank account

Correct Answer

verifed

verified

A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.


A) Tracking
B) Monitoring
C) Second-party
D) Third-party
E) First-party

Correct Answer

verifed

verified

Methods you should use to protect your portable devices and information include all of the following except:


A) Using two-factor authentication.
B) Making certain not to leave your portable devices in plain view in a car.
C) Keeping your portable devices in an inconspicuous container.
D) Encrypting the hard drive of your laptop.
E) All of the above are legitimate protection methods.

Correct Answer

verifed

verified

Content-filtering software performs all of the following functions except:


A) Blocking access to undesirable Web sites.
B) Recording all Web sites visited.
C) Proactively monitoring computers to protect against malware attacks.
D) Recording both sides of chat conversations.
E) Enabling users to selectively filter content.

Correct Answer

verifed

verified

_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet connection, passwords, chat conversations, Web cams, and screenshots.


A) Firewall
B) Anti-malware
C) Monitoring
D) Content-filtering
E) Anti-spyware

Correct Answer

verifed

verified

You should use debit cards because they are directly linked to your bank account and, therefore, you cannot overspend.

Correct Answer

verifed

verified

Which of the following is not a reason to install proactive intrusion detection and prevention software on your computer?


A) Anti-malware software is reactive.
B) This software reduces your vulnerability to zero-day attacks.
C) Anti-malware software requires you to update malware signatures on a regular basis.
D) This software reduces your vulnerability to distributed denial-of-service attacks.
E) None of these

Correct Answer

verifed

verified

A(n) _____ is a computer to which you connect, that in turn connects to the Web site you wish to visit.


A) Proxy server
B) Internet server
C) Intermediate server
D) Backbone server
E) E-mail server

Correct Answer

verifed

verified

Your little brother came for a visit and used your laptop. You didn't think anything of it at the time, but now your laptop is running really slow. Which of the following statements is false?


A) It can't be a worm because your anti-malware software would have blocked it.
B) It can't be a Trojan horse because your anti-spam software would have blocked it.
C) It can't be your brother's fault because he only visited Web sites, and he didn't open any files.
D) Your brother admits to opening a joke file on his e-mail, but the file was from a good friend, so it can't be your brother's fault.
E) All of the statements are false.

Correct Answer

verifed

verified

You are going on a business trip. Which of the following would be the worst type of card to take?


A) Credit card (Visa, MasterCard, American Express, etc.)
B) Debit card
C) Virtual credit card.
D) Bank card

Correct Answer

verifed

verified

A _____ offers you the option of shopping online with a disposable credit card number.


A) Credit card
B) Debit card
C) Driver's license
D) Virtual credit card
E) Bank card

Correct Answer

verifed

verified

A single-cut shredder is sufficient to shred your documents at home, whereas a cross-cut (confetti)shredder is necessary at work because your work documents are more sensitive.

Correct Answer

verifed

verified

If your identity is stolen, what is the first thing you should do?


A) Change all of your credit cards.
B) Get a lawyer.
C) Open a file with all of your paperwork.
D) File a detailed police report.
E) Notify the three major credit-reporting agencies.

Correct Answer

verifed

verified

A(n) ___________ refers to software installed on your computer that controls communications to and from your computer by permitting or denying communications based on your security settings.


A) Proactive monitoring package
B) Anti-spyware package
C) Content-filtering package
D) Anti-malware package
E) Personal firewall

Correct Answer

verifed

verified

Anti- Malware programs need to be run once a year.

Correct Answer

verifed

verified

Showing 21 - 38 of 38

Related Exams

Show Answer