A _____ offers you the option of shopping online with a disposable credit card number.
correct answers Virtual credit card
Which of the following statements is not correct?
a) You should use credit cards with your picture on them.
b) You may use virtual credit cards for additional security.
c) You should use debit cards whenever possible for additional security.
d) You cannot use virtual credit cards for in-store purchases.
e) Signatures on credit cards are often impossible to read. correct answers You should use
debit cards whenever possible for additional security.
Your liability with credit cards is typically _____, whereas your liability with debit cards is
_____. correct answers Zero, the amount in your bank account
Which of the following statements about companies that provide proactive protection of your
information assets is not correct? correct answers These companies operate independently of
the three major credit reporting agencies.
) If your identity is stolen, what is the first thing you should do? correct answers Get a lawyer
A(n) ___________ refers to software installed on your computer that controls
communications to and from your computer by permitting or denying communications based
on your security settings. correct answers Personal firewall
Personal firewalls perform all of the following functions except: correct answers They should
seek out the origin of malware in an attempt to block it in the future.
_____ software logs keystrokes, e-mails, applications, windows, Web sites, Internet
connection, passwords, chat conversations, Web cams, and screenshots. correct answers
Monitoring
Content-filtering software performs all of the following functions except: correct answers
Proactively monitoring computers to protect against malware attacks.
Which of the following is not a reason to install proactive intrusion detection and prevention
software on your computer? correct answers This software reduces your vulnerability to
distributed denial-of-service attacks.
Which of the following attacks is most closely associated with downloading and installing
patches immediately? correct answers Zero-day attack
Methods you should use to protect your portable devices and information include all of the
following except:
a) Using two-factor authentication.
b) Making certain not to leave your portable devices in plain view in a car.
c) Keeping your portable devices in an inconspicuous container.