CITI - Safer Social Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Information security begins with a secure computing device. Which of the following statements is correct about computer device security?

All of the above

Information sharing requires considering both the type of information and the context of sharing. Which of the following statements about information sharing is correct?

All of the above

Third-party add-on software can defeat all of a device's security measures if it contains malware. Which of the following statements is correct about third-party add-on software?

For a work device, particularly if it is provided by an employer, individuals should install only what has been expressly approved.

Broadly speaking, the compromise of personal information falls under the heading of identity theft. Which of the following is a correct statement about identity theft?

Identity theft can occur because of a compromised computer account, but also from information one posts publicly, like on an unprotected page of a social networking site.

Every social networking site allows its users to exert some control over their information sharing. Which of the following statements about those privacy-security controls is correct?

It is generally advised to set text postings and images to "private," limiting access to a known circle of acquaintances.

Impersonations of an acquaintance or an organization with which one is familiar are called phishing attacks -- and, when precisely targeted based on personal information, spear phishing. Which of the following is a correct statement about phishing?

Links in phishing messages are one of the ways the attack occurs - click on the link, and malicious software is installed.

Information can be catastrophically compromised by installation of malicious software (malware) on a computing device. Which of the following is a correct statement about malware?

Once installed, malware can harvest personal information (such as from an address book to propagate itself to a person's contacts).

Organizational use of social networking sites for "social media marketing" is now very common. Which of the following is true about social networking at work?

Organizations tend to be conservative about their reputations, so can have formal or at least informal rules about what employees can post even on personal sites.


Set pelajaran terkait

J: Chapter 23: Disruptive Behavior Disorders

View Set

EMT Ch 37: Hazardous Materials, Multiple-Casualty Incidents, and Incident Management

View Set

Security+ SY0-601 Certification Practice Exam

View Set