1.
Any formula pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:
Correct Answer
C. A trade secret
Explanation
A trade secret refers to any formula pattern, device, or compilation of information that is used in one's business and provides them with a competitive advantage over competitors who are unaware of or do not use it. Unlike a patent, which grants exclusive rights to an invention for a limited period of time, a trade secret is not publicly disclosed and remains confidential. It allows the owner to maintain a monopoly over the information and prevents others from replicating or benefiting from it without authorization.
2.
Probably the main reason for loss of sensitive information is:
Correct Answer
A. In advertent disclosure
Explanation
Inadvertent disclosure refers to the unintentional release or sharing of sensitive information. This can happen due to human error, such as sending an email to the wrong recipient or leaving a document unattended. It is a common reason for the loss of sensitive information as it does not involve any deliberate or malicious intent.
3.
The primary tool of pre-employment screening is the:
Correct Answer
B. Application form
Explanation
The application form is the primary tool of pre-employment screening because it allows employers to gather important information about the applicant's qualifications, work history, and personal background. It provides a standardized format for collecting consistent information from all applicants, making it easier for employers to compare and evaluate candidates. The application form also helps employers comply with legal requirements and avoid potential discrimination by asking only job-related questions. Overall, the application form is an essential tool for employers to assess the suitability of candidates for a particular job position.
4.
Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:
Correct Answer
A. Alert senior management to market place changes in order to prevent surprise
Explanation
Competitive intelligence gathering is an activity that helps firms stay informed about market changes and trends. By alerting senior management to marketplace changes, they can proactively respond and adapt their strategies to prevent any surprises or disruptions. This allows the company to stay competitive and make informed decisions based on the current market conditions. It is not related to personal habits of competitive senior management, government intelligence agencies, or changes in protocol in foreign countries.
5.
The instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:
Correct Answer
D. A pen register
Explanation
A pen register is an instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone. It is different from a wiretap or bug, which involve intercepting and recording conversations. A pen register simply records the numbers dialed, providing a log of outgoing calls made from a specific phone. It is commonly used by law enforcement agencies with proper legal authorization to gather evidence or track phone activity during investigations.
6.
A clandestine listening device, generally a small hidden microphone and radio transmitter is known as:
Correct Answer
B. A bug
Explanation
A clandestine listening device that consists of a small hidden microphone and radio transmitter is commonly referred to as a "bug." This device is used for covertly intercepting and transmitting audio signals without the knowledge or consent of the individuals being monitored. It is an illegal and unethical practice that violates privacy rights.
7.
A microphone with a large disk like attachment used for listening to audio from great distances is known as:
Correct Answer
C. Parabolic micropHone
Explanation
A parabolic microphone is a type of microphone that uses a large dish-shaped attachment to capture audio from great distances. The dish acts as a parabolic reflector, focusing sound waves onto a small microphone element at the focal point. This design allows the microphone to pick up distant sounds with high precision and sensitivity. The other options, such as contact microphone, spike microphone, and moving coil microphone, do not specifically refer to a microphone with a large disk-like attachment for long-distance listening.
8.
Sound waves too high in frequency to be heard by the human ear, generally above 20KHZ are known as:
Correct Answer
B. Ultrasonic
Explanation
Ultrasonic waves are sound waves that have a frequency higher than the upper limit of human hearing, which is typically around 20,000 Hz. These waves are used in various applications such as medical imaging, cleaning, and measuring distances. Microwaves, on the other hand, are electromagnetic waves with longer wavelengths and lower frequencies that are commonly used in cooking. High frequency and short wave are more general terms that do not specifically refer to sound waves.
9.
Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don’t discuss sensitive information" and the other is:
Correct Answer
D. To use encryption equipment
Explanation
Using encryption equipment is a reliable method of protection against telephone line eavesdropping because it ensures that any sensitive information transmitted over the phone is encoded and can only be decoded by authorized parties. This prevents unauthorized individuals from intercepting and understanding the content of the conversation. Encryption adds a layer of security to the communication, making it extremely difficult for eavesdroppers to decipher the information even if they manage to intercept the transmission.
10.
The unauthorized acquisition of sensitive information is known as:
Correct Answer
A. Industrial espionage
Explanation
Industrial espionage refers to the unauthorized acquisition of sensitive information from a company or organization. It involves the theft or unauthorized access of trade secrets, intellectual property, or confidential information for competitive advantage. This can be done through various means, such as hacking, infiltration, or bribery. Unlike embezzlement, larceny, or false pretenses, which involve theft or fraud for personal gain, industrial espionage specifically targets sensitive information for commercial or economic purposes.
11.
Proprietary information is:
Correct Answer
D. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly
Explanation
Proprietary information refers to any information that an enterprise deems relevant to its status or operations and wishes to keep confidential, without disclosing it publicly. This can include trade secrets, intellectual property, customer data, financial information, and any other sensitive information that could give the enterprise a competitive advantage or harm its business if it falls into the wrong hands. It is important for companies to protect their proprietary information to maintain their competitive edge and safeguard their operations.
12.
A trade secret is:
Correct Answer
A. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it
Explanation
A trade secret refers to any formula, pattern, device, or compilation of information that is utilized in a business and provides that business with a competitive advantage over rivals who are unaware of or do not employ it. This definition highlights the essence of a trade secret, which is the confidential and valuable information that a company keeps secret to maintain its competitive edge in the market.
13.
The control software of a Private Board Exchange (PBX) can be accessed and comprise by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:
Correct Answer
B. Remote Maintenance Access Terminal
Explanation
The correct answer is Remote Maintenance Access Terminal. The explanation for this is that the Remote Maintenance Access Terminal is a device on a PBX that allows access to the control software. It can be accessed by calling its telephone number from a computer and modem. This device is specifically designed for remote maintenance and management of the PBX system.
14.
Which of the following is generally not true with regard to proprietary information?
Correct Answer
A. Secret information does not have to be specifically identifiable
15.
With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:
Correct Answer
A. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information
Explanation
In this situation, if there is no evidence to prove that the owner of the trade secret took reasonable precautions to protect the confidential information, it may be decided that the disclosure of the trade secret by another party was innocent rather than wrongful. This means that even if the person making the disclosure had malice or wrong intent, they may not be held liable if the owner did not take adequate measures to safeguard the confidential information.
16.
The class of person under a duty to safeguard a proprietary secret is known as:
Correct Answer
C. Fiduciaries
Explanation
Fiduciaries are individuals who are entrusted with the responsibility of safeguarding and protecting the interests of another person or entity. They have a legal and ethical duty to act in the best interests of the party they represent. In the context of proprietary secrets, fiduciaries would be the class of persons who have a duty to protect and keep confidential any proprietary secrets they have access to. This includes employees, trustees, or anyone else who has been entrusted with such information.
17.
Which of the following is not a correct statement, or a general rule involving the protection of proprietary information?
Correct Answer
D. Any agreements to be bound must always be in writing and are not implied from acts
Explanation
The correct answer is "Any agreements to be bound must always be in writing and are not implied from acts." This statement is not a correct statement or a general rule involving the protection of proprietary information. In some cases, agreements to be bound can be implied from acts, and they do not always have to be in writing.
18.
Probably the chief reason for the loss of information about sensitive operations is:
Correct Answer
D. Lost through inadvertent disclosure
Explanation
Inadvertent disclosure refers to the accidental or unintentional release of sensitive information. This can occur through various means such as human error, misconfiguration of systems, or inadequate security measures. Unlike deliberate theft by outsiders or insiders, inadvertent disclosure happens without any malicious intent. It often results from negligence, lack of awareness, or simple mistakes. This type of loss of information is common and can have serious consequences, as it exposes sensitive operations to unauthorized individuals or entities.
19.
The term" eavesdropping" refers to:
Correct Answer
C. Both wiretapping and "bugging"
Explanation
The term "eavesdropping" refers to both wiretapping and "bugging". Wiretapping involves intercepting and listening to telephone or electronic communications without the knowledge or consent of the parties involved. "Bugging" refers to the act of covertly placing a device, such as a microphone or camera, to secretly listen to or record conversations. Both wiretapping and "bugging" involve unauthorized surveillance and invasion of privacy.
20.
A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:
Correct Answer
B. Dynamic micropHone
Explanation
A dynamic microphone is the correct answer because it does not require a power source to operate, is small in size, and can be discreetly hidden in items like cuff links and hearing aids. This type of microphone uses a diaphragm and coil to convert sound waves into electrical signals, making it a versatile and portable option for various audio recording applications.
21.
A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation:
Correct Answer
C. Contact micropHone
Explanation
A contact microphone is the correct answer because it can be attached directly to a surface, such as a wall, to pick up vibrations and sound waves. This makes it ideal for situations where it is difficult or impossible to enter the area and install a traditional microphone. The contact microphone is able to capture sound by directly sensing the vibrations of the surface it is attached to, allowing for effective audio recording in these challenging scenarios.
22.
Which of the following is not true with regard to electronic eavesdropping?
Correct Answer
A. A listening device installed in a wire will cause a cracking sound, click or other noise that can be heard on the line
Explanation
Electronic eavesdropping devices are designed to be covert and undetectable. Therefore, a listening device installed in a wire would not cause any noticeable noise or interference on the line. This is why the statement is not true.
23.
In designing a proprietary information protection program, the area of greatest vulnerability is:
Correct Answer
C. Employees
Explanation
In designing a proprietary information protection program, the area of greatest vulnerability is employees. This is because employees have access to sensitive information and can potentially misuse or leak it. They may intentionally or unintentionally share confidential data with unauthorized individuals, leading to breaches in security. Therefore, it is crucial to implement strict policies, training, and monitoring measures to mitigate the risk posed by employees and ensure the protection of proprietary information.
24.
Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third?
Correct Answer
D. Theft by an insider
Explanation
The third method of information loss is theft by an insider. This refers to situations where someone within an organization intentionally steals or leaks sensitive information. Unlike inadvertent disclosure, which is accidental, or industrial espionage, which involves external parties, theft by an insider involves a breach of trust from someone within the organization itself. This can have significant consequences as insiders have access to confidential information and can exploit it for personal gain or to harm the organization.
25.
Which of the following statements is incorrect with regard to an information security program?
Correct Answer
A. A good information security program will provide absolute protection against an enemy spy
Explanation
A good information security program aims to make theft of sensitive information difficult, but it cannot provide absolute protection against an enemy spy. No security program can guarantee complete protection against determined adversaries. It is important to establish and maintain trust relationships with employees and rely on their good will and compliance for the success of the program.
26.
Vital records normally constitute the following percentage of the company’s total records:
Correct Answer
A. 2%
Explanation
Vital records typically make up a small percentage of a company's total records. The correct answer is 2%, indicating that vital records only constitute a minor portion of the company's overall records. This suggests that most of the company's records are not considered vital, meaning they are not crucial or essential for the company's operations or legal requirements.
27.
A specially- constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:
Correct Answer
C. Contact micropHone
Explanation
A contact microphone is a specially-constructed microphone that is attached directly to an object or surface to be protected. It is designed to respond only when the protected object or surface is disturbed. This type of microphone is commonly used in applications such as recording acoustic instruments, capturing sound vibrations in machinery, or detecting unauthorized tampering or movement of objects. By directly contacting the object or surface, the contact microphone can pick up even the slightest vibrations or disturbances, making it an ideal choice for specific surveillance or monitoring purposes.
28.
"Social engineering" is:
Correct Answer
C. The subtle elicitation of information without revealing the true purpose of the call
Explanation
"Social engineering" refers to the act of manipulating or deceiving individuals to gain unauthorized access to sensitive information or systems. It involves using psychological tactics to trick people into revealing confidential information without them realizing the true intention behind the interaction. This can be done through various means such as phone calls, emails, or in-person interactions. The correct answer states that social engineering is the subtle elicitation of information without revealing the true purpose of the call, which accurately describes the concept.
29.
A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?
Correct Answer
D. Other employees may leave the company and attempt to use trade secret information in the business of a new employer
Explanation
The other employees leaving the company and attempting to use trade secret information in the business of a new employer is a serious factor to be considered. This situation can lead to further loss of trade secrets and potential harm to the company.
30.
Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?
Correct Answer
C. Tempest shielding
Explanation
Tempest shielding is used to protect very sensitive equipment from electromagnetic radiation. Tempest shielding refers to the measures taken to prevent the emission of electromagnetic signals from electronic devices that could be intercepted and used for unauthorized purposes. It involves the use of specialized materials and techniques to minimize electromagnetic emissions and ensure the security of sensitive information.