Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly.
In advertent disclosure
Deliberately stolen by outsider
Industrial espionage
Deliberately stolen by insider
Rate this question:
Interview
Application form
The investigation
The investigator
Rate this question:
Alert senior management to market place changes in order to prevent surprise
Alert senior management as to the personal habits of competitive senior management
Alert government intelligence agencies to marketplace changes
Alert senior management to changes in protocol in foreign countries
Rate this question:
A wiretap
A bug
An electronic surveillance
A pen register
Rate this question:
A wiretap
A bug
A tempest
A beeper
Rate this question:
Contact microphone
Spike microphone
Parabolic microphone
Moving coil microphone
Rate this question:
Microwaves
Ultrasonic
High frequency
Short wave
Rate this question:
To use wire tap detector
To use radio jammer
To use audio jammer
To use encryption equipment
Rate this question:
Industrial espionage
Embezzlement
Larceny
False pretenses
Rate this question:
Information which must be so classified under government order
Private information of highly sensitive character
Defense data which must be classified according to federal regulations
Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly
Rate this question:
Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it
All information about a company which the company desires to protect
Information of a company which is registered as such with the U.S Patent office
Information so designated by the government
Rate this question:
Time Domain Reflectometer
Remote Maintenance Access Terminal
Current Carrier Signaling Port
Internal and Remote Signal Port
Rate this question:
Secret information does not have to be specifically identifiable
Secret information must be such that it can be effectively protected
The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information
It is difficult to protect as a trade secret that which can be found in publicly- accessible sources
There is absence of evidence that an owner has taken reasonable precautions to protect confidential information
The trade secret was not registered
The trade secret did not involve national defense information
The trade secret was not in a current use
Rate this question:
Agents
Agents
Fiduciaries
Business Associates
Rate this question:
By operation of common law employees are presumed to be fiduciaries to extent they may not disclose secrets of their employers without authorization
As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
Other than employees, any other persons to be bound to secrecy must agree to be so bound
Any agreements to be bound must always be in writing and are not implied from acts
Rate this question:
Deliberately stolen by outsider
Loss by fire or other disaster
Deliberately stolen by insider
Lost through inadvertent disclosure
Rate this question:
Wire tapping only
“Bugging” only
Both wiretapping and "bugging"
Mail covers
Rate this question:
Carbon microphone
Dynamic microphone
Contact microphone
Parabolic microphone
Rate this question:
Carbon microphone
Dynamic microphone
Contact microphone
Parabolic microphone
Rate this question:
A listening device installed in a wire will cause a cracking sound, click or other noise that can be heard on the line
An effective countermeasures survey to detect evidences of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment
All wiring should be traced out and accounted for in countermeasures survey
In a countermeasures survey to detect electronic eavesdropping, a physical search should be utilized as well as an electronic search
Rate this question:
Personnel files
Marketing data
Employees
Computers
Rate this question:
A newspaper articles
Television
Magazine articles
Theft by an insider
Rate this question:
A good information security program will provide absolute protection against an enemy spy
The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it
A trust relationship must be established and maintained with employees
The good will and compliance of employees is crucial for success
Rate this question:
2%
5%
10%
15%
Rate this question:
Parabolic microphone
Special audio device
Contact microphone
Surreptitious microphone
Rate this question:
The conversation involved in the beginning of a romantic relationship
A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity
The subtle elicitation of information without revealing the true purpose of the call
The specific design of a business structure to facilitate the interaction of the inhabitants
Rate this question:
You may have to expose the very secrets you are attempting to protect
The cost of the litigation may exceed the value of the secret information
You may lose a law case
Other employees may leave the company and attempt to use trade secret information in the business of a new employer
Rate this question:
A current carrier device
Pneumatic cavity shielding
Tempest shielding
Pen register shielding
Rate this question:
Quiz Review Timeline (Updated): Aug 13, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.