List some common precautions that can reduce the chance of a serious personal safety problem occurring due to online activities.
What will be an ideal response?
Answers will vary. The following can help you protect yourself against cyberstalking and other types of online harassment: Be discreet online and use gender-neutral, nonprovocative identifying names, such as jsmith, instead of janesmith or iamcute.Be careful about the types of photos you post of yourself online or email to others, and do not reveal personal information, such as your real name, address, or telephone number, to people you meet online.Do not respond to any insults or other harassing comments you receive online.Consider requesting that your personal information be removed from online directories, especially those associated with your email address or other online identifiers.If you are a parent, protect your children by monitoring their computer and smartphone activities as well as making sure that they know what activities are off-limits and that they cannot reveal personal information online without your permission. Please see the section "Cyberstalking and Other Personal Safety Concerns" for more information.?
You might also like to view...
On your cheat sheet, what did you write down for toggling the grid off?
a. Click View on the Application bar, then select the Screen Mode option b. Click View on the Application bar, then Lock Guides. c. Click View on the Application bar, then Clear Guides. d. Click View on the Application bar, then Show submenu, deselect Grid.
Which of the following is the best example of a fundamental network management tool?
a. SNMP b. ping c. trace route d. Documentation
C++ allows the use of references for indirect addressing.
Answer the following statement true (T) or false (F)
Vulnerability ________ is an important tool for information security management as it identifies all the security weaknesses before an attacker can exploit them.
A. assessment B. scoring C. reporting D. research