Chapter 3 When Customers Sign With These Companies Merchants

subject Type Homework Help
subject Pages 3
subject Words 594
subject Authors Brad Prince, R. Kelly Rainer

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Package Title: HomeworkQuestions
Course Title: IS 5e
Chapter Number: Technology Guide 5
Question Type: True/False
1) The only target for cyber criminals are organizations with valuable information such as customer
credit card information.
2) Over the years, improved security software has made it progressively more difficult for hackers to get
access to potential victim’s computers.
3) A _____ offers you the option of shopping online with a disposable credit card number.
a) Credit card
b) Debit card
c) Driver’s license
d) Virtual credit card
e) Bank card
page-pf2
4) Your liability with credit cards is typically _____, where your liability with debit cards is _____.
a) The amount in your bank account, your credit limit
b) Your credit limit, the amount in your bank account
c) The amount in your bank account, zero
d) Your credit limit, zero
e) Zero, the amount in your bank account
5) Which of the following statements about companies that provide proactive protection of your
information assets is not correct?
a) These companies allow their customers to lock their credit files.
b) These companies ensure that new lines of credit cannot be opened unless their clients unlock their
credit files.
c) These companies operate independently of the three major credit reporting agencies.
d) When customers sign up with these companies, merchants and banks must obtain their verbal or
written permission before opening new lines of credit in their names.
e) These companies will proactively monitor their clients’ credit files at the three credit reporting
agencies.
6) Content-filtering software performs all of the following functions except:
a) It blocks access to undesirable Web sites.
b) It records all Web sites that users have visited.
page-pf3
c) It proactively monitors computers against malware attacks.
d) It records both sides of chat conversations.
e) It enables users to selectively filter content.
7) Which of the following actions should you take to protect your portable devices and information?
a) Use two-factor authentication.
b) Do not leave your portable devices in plain view in a car.
c) Keep your portable devices in an inconspicuous container.
d) Encrypt the hard drive of your laptop
e) All of these
8) A _____ cookie either originates on, or is sent to, the Web site that you are currently viewing.
a) Tracking
b) Monitoring
c) Second-party
d) Third-party
e) First-party

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.