1 / 667

CPP

CPP. Study Guide # 2 1 - 667. Sensitive Information. Sample Questions. 1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:. a. A monopoly

arasmussen
Download Presentation

CPP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CPP • Study Guide # 2 • 1 - 667

  2. Sensitive Information Sample Questions

  3. 1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: • a. A monopoly • b. An unfair trade practice • c. A trade secret • d. A patent

  4. 1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is: • a. A monopoly • b. An unfair trade practice • c. A trade secret • d. A patent

  5. 2. Probably the main reason for loss of sensitive information is: • a. Inadvertent disclosure • b. Deliberately stolen by outsider • c. Industrial espionage • d. Deliberately stolen by insider

  6. 2. Probably the main reason for loss of sensitive information is: • a. Inadvertent disclosure • b. Deliberately stolen by outsider • c. Industrial espionage • d. Deliberately stolen by insider

  7. 3. The primary tool of pre-employment screening is the: • a. Interview • b. Application form • c. The investigation • d. The investigator

  8. 3. The primary tool of pre-employment screening is the: • a. Interview • b. Application form • c. The investigation • d. The investigator

  9. 4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: • a. Alert senior management to marketplace changes in order to prevent surprise • b. Alert senior management as to the personal habits of competitive senior management • c. Alert government intelligence agencies to marketplace changes • d. Alert senior management to changes in protocol in foreign countries

  10. 4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: • a. Alert senior management to marketplace changes in order to prevent surprise • b. Alert senior management as to the personal habits of competitive senior management • c. Alert government intelligence agencies to marketplace changes • d. Alert senior management to changes in protocol in foreign countries

  11. 5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called: • a. A wiretap • b. A bug • c. An electronic surveillance • d. A pen register

  12. 5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called: • a. A wiretap • b. A bug • c. An electronic surveillance • d. A pen register

  13. 6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : • a. A bug • b. A wiretap • c. A tempest • d. A beeper

  14. 6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as : • a. A bug • b. A wiretap • c. A tempest • d. A beeper

  15. 7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: • a. Contact microphone • b. Spike microphone • c. Parabolic microphone • d. Moving coil microphone

  16. 7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: • a. Contact microphone • b. Spike microphone • c. Parabolic microphone • d. Moving coil microphone

  17. 8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: • a. Microwaves • b. Ultrasonic • c. High frequency • d. Short-wave

  18. 8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as: • a. Microwaves • b. Ultrasonic • c. High frequency • d. Short-wave

  19. 9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is: • a. To use a wire tap detector • b. To use a radio jammer • c. To use an audio jammer • d. To use encryption equipment

  20. 9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is: • a. To use a wire tap detector • b. To use a radio jammer • c. To use an audio jammer • d. To use encryption equipment

  21. 10. The unauthorized acquisition of sensitive information is known as: • a. Industrial espionage • b. Embezzlement • c. Larceny • d. False pretenses

  22. 10. The unauthorized acquisition of sensitive information is known as: • a. Industrial espionage • b. Embezzlement • c. Larceny • d. False pretenses

  23. 11. Proprietary information is: • a. Information which must be so classified under government order • b. Private information of highly sensitive character • c. Defense data which must be classified according to federal regulations • d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

  24. 11. Proprietary information is: • a. Information which must be so classified under government order • b. Private information of highly sensitive character • c. Defense data which must be classified according to federal regulations • d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

  25. 12. A trade secret is: • a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it • b. All information about a company which the company desires to protect • c. Information of a company which is registered as such with the Patent Office • d. Information so designated by the government

  26. 12. A trade secret is: • a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it • b. All information about a company which the company desires to protect • c. Information of a company which is registered as such with the Patent Office • d. Information so designated by the government

  27. 13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: • a. Time Domain Reflectometer • b. Remote Maintenance Access Terminal • c. Current Carrier Signaling Port • d. Internal and Remote Signal Port

  28. 13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the: • a. Time Domain Reflectometer • b. Remote Maintenance Access Terminal • c. Current Carrier Signaling Port • d. Internal and Remote Signal Port

  29. 14. Which of the following is generally not true in regard to proprietary information? • a. Secret information does not have to be specifically identifiable • b. Secret information must be such that it can be effectively protected • c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information • d. It is difficult to protect as a trade secret that which can be found in publicly accessible sources

  30. 14. Which of the following is generally not true in regard to proprietary information? • a. Secret information does not have to be specifically identifiable • b. Secret information must be such that it can be effectively protected • c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information • d. It is difficult to protect as a trade secret that which can be found in publicly accessible sources

  31. 15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when: • a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information • b. The trade secret was not registered • c. The trade secret did not involve national defense information • d. The trade secret was not in current use

  32. 15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when: • a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information • b. The trade secret was not registered • c. The trade secret did not involve national defense information • d. The trade secret was not in current use

  33. 16. The class of person under a duty to safeguard a proprietary secret is known as: • a. Agents • b. Principals • c. Fiduciaries • d. Business Associates

  34. 16. The class of person under a duty to safeguard a proprietary secret is known as: • a. Agents • b. Principals • c. Fiduciaries • d. Business Associates

  35. 17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information? • a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization • b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship • c. Other than employees, any other persons to be bound to secrecy must agree to be so bound • d. Any agreements to be bound must always be in writing and are not implied from acts

  36. 17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information? • a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization • b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship • c. Other than employees, any other persons to be bound to secrecy must agree to be so bound • d. Any agreements to be bound must always be in writing and are not implied from acts

  37. 18. Probably the chief reason for the loss of information about sensitive operations is: • a. Deliberately stolen by an outsider • b. Loss by fire or other disaster • c. Deliberately stolen by insider • d. Lost through inadvertent disclosure

  38. 18. Probably the chief reason for the loss of information about sensitive operations is: • a. Deliberately stolen by an outsider • b. Loss by fire or other disaster • c. Deliberately stolen by insider • d. Lost through inadvertent disclosure

  39. 19. The term “eavesdropping” refers to: • a. Wiretapping only • b. “Bugging” only • c. Both wiretapping and “bugging” • d. Mail covers

  40. 19. The term “eavesdropping” refers to: • a. Wiretapping only • b. “Bugging” only • c. Both wiretapping and “bugging” • d. Mail covers

  41. 20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  42. 20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  43. 21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  44. 21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  45. 22. Which of the following is not true with regard to electronic eavesdropping: • a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line • b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment • c. All wiring should be traced out and accounted for in a countermeasures survey • d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

  46. 22. Which of the following is not true with regard to electronic eavesdropping: • a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line • b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment • c. All wiring should be traced out and accounted for in a countermeasures survey • d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

  47. 23. In designing a proprietary information protection program, the area of greatest vulnerability is: • a. Personnel files • b. Marketing data • c. Employees • d. Computers

  48. 23. In designing a proprietary information protection program, the area of greatest vulnerability is: • a. Personnel files • b. Marketing data • c. Employees • d. Computers

  49. 24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third: • a. Newspaper articles • b. Television • c. Magazine articles • d. Theft by an insider

  50. 24. Two of the three most common methods of information losses are inadvertentdisclosure and industrial espionage. Which of the following is the third: • a. Newspaper articles • b. Television • c. Magazine articles • d. Theft by an insider

More Related