1 / 277

Part V-Information Security

Learn about different types of sensitive information, trade secrets, and protection methods against data breaches in this comprehensive guide.

veliz
Download Presentation

Part V-Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Part V-Information Security

  2. 1. All proprietary information is sensitive while not all sensitive information is proprietary. An example of information which is not proprietary even though the organization would treat it as sensitive is: • a. The customer database of the organization • b. Confidential personnel data in employee files • c. Strategic marketing plans in which the use of outside marketing firms is contemplated • d. Specifications for product components which are produced by a subcontractor

  3. 1. All proprietary information is sensitive while not all sensitive information is proprietary. An example of information which is not proprietary even though the organization would treat it as sensitive is: • a. The customer database of the organization • b. Confidential personnel data in employee files • c. Strategic marketing plans in which the use of outside marketing firms is contemplated • d. Specifications for product components which are produced by a subcontractor

  4. 2. Trade Secrets are generally afforded greater legal protection than other proprietary information. Which of the following in not an element of the test for a trade secret? • a. Be identifiable • b. Not already be available in public sources • c. Be disclosed only to persons with a duty to protect it • d. Be technical or product related

  5. 2. Trade Secrets are generally afforded greater legal protection than other proprietary information. Which of the following in not an element of the test for a trade secret? • a. Be identifiable • b. Not already be available in public sources • c. Be disclosed only to persons with a duty to protect it • d. Be technical or product related

  6. 3. The major reason for the loss of sensitive information is? • a. Espionage • b. Intentional disclosure by an insider • c. Inadvertent disclosure • d. Disclosure through legal proceedings

  7. 3. The major reason for the loss of sensitive information is? • a. Espionage • b. Intentional disclosure by an insider • c. Inadvertent disclosure • d. Disclosure through legal proceedings

  8. 4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: • a. Alert senior management to marketplace changes in order to prevent surprise • b. Alert senior management as to the personal habits of competitive senior management • c. Alert government intelligence agencies to marketplace changes • d. Alert senior management to changes in protocol in foreign countries

  9. 4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to: • a. Alert senior management to marketplace changes in order to prevent surprise • b. Alert senior management as to the personal habits of competitive senior management • c. Alert government intelligence agencies to marketplace changes • d. Alert senior management to changes in protocol in foreign countries

  10. 5. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: • a. Contact microphone • b. Spike microphone • c. Parabolic microphone • d. Moving coil microphone

  11. 5. A microphone with a large disk-like attachment used for listening to audio from great distances is known as: • a. Contact microphone • b. Spike microphone • c. Parabolic microphone • d. Moving coil microphone

  12. 6. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHz are known as: • a. Microwaves • b. Ultrasonic • c. High-frequency • d. Short-wave

  13. 6. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHz are known as: • a. Microwaves • b. Ultrasonic • c. High-frequency • d. Short-wave

  14. 7. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don't discuss sensitive information" and the other is: • a. To use wire tap detector • b. To use radio jammer • c. To use audio jammer • d. To use encryption equipment

  15. 7. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don't discuss sensitive information" and the other is: • a. To use wire tap detector • b. To use radio jammer • c. To use audio jammer • d. To use encryption equipment

  16. 8. The unauthorized acquisition of sensitive information is known as: • a. Industrial espionage • b. Embezzlement • c. Larceny • d. False pretenses

  17. 8. The unauthorized acquisition of sensitive information is known as: • a. Industrial espionage • b. Embezzlement • c. Larceny • d. False pretenses

  18. 9. Proprietary information is: • a. Information which must be so classified under government order • b. Private information of highly sensitive character • c. Defense data which must be classified according to federal regulations • d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly.

  19. 9. Proprietary information is: • a. Information which must be so classified under government order • b. Private information of highly sensitive character • c. Defense data which must be classified according to federal regulations • d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly.

  20. 10. A Trade secret is: • a. Any formula, pattern, device or compilation of information which is used in one's business and which gives that business an opportunity to gain an advantage over competition who do not know or use it • b. All information about a company which the company desires to protect • c. Information of a company which is registered as such with the U.S. Patent Office • d. Information so designed by the government

  21. 10. A Trade secret is: • a. Any formula, pattern, device or compilation of information which is used in one's business and which gives that business an opportunity to gain an advantage over competition who do not know or use it • b. All information about a company which the company desires to protect • c. Information of a company which is registered as such with the U.S. Patent Office • d. Information so designed by the government

  22. 11. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. What is this access device called: • a. Time Domain Reflectometer • b. Remote Maintenance Access Terminal • c. Current Carrier Signaling Port • d. Internal and Remote Signal Port

  23. 11. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. What is this access device called: • a. Time Domain Reflectometer • b. Remote Maintenance Access Terminal • c. Current Carrier Signaling Port • d. Internal and Remote Signal Port

  24. 12. Which of the following is generally not true with regard to proprietary information? • a. Secret information does not have to be specifically identifiable • b. Secret information must be such that it can be effectively protected • c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information • d. It is difficult to protect as a trade secret that which can be found in publicly-accessible sources

  25. 12. Which of the following is generally not true with regard to proprietary information? • a. Secret information does not have to be specifically identifiable • b. Secret information must be such that it can be effectively protected • c. The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information • d. It is difficult to protect as a trade secret that which can be found in publicly-accessible sources

  26. 13. With respect to trade secrets it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur wh~n: • a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information • b. Trade secret was not registered • c. The trade secret did not involve national defense information • d. The trade secret was not in current use

  27. 13. With respect to trade secrets it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur wh~n: • a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information • b. Trade secret was not registered • c. The trade secret did not involve national defense information • d. The trade secret was not in current use

  28. 14. The class of person under a duty to safeguard a proprietary secret is known as: • a. Agents • b. Principals • c. Fiduciaries • d. Business Associates

  29. 14. The class of person under a duty to safeguard a proprietary secret is known as: • a. Agents • b. Principals • c. Fiduciaries • d. Business Associates

  30. 15. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information: • a. By operation of common law employees are presumed to be fiduciaries to extent they may not disclose secrets of their emulovers without authorization A . • b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship • c. Other than employees, any other persons to be bound to secrecy must agree to be bound • d. Any agreements to bound must always be in writing and are not implied from acts

  31. 15. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information: • a. By operation of common law employees are presumed to be fiduciaries to extent they may not disclose secrets of their emulovers without authorization A . • b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship • c. Other than employees, any other persons to be bound to secrecy must agree to be bound • d. Any agreements to bound must always be in writing and are not implied from acts

  32. 16. The term "eavesdropping" refers to: • a. Wiretapping only • b. "Bugging" only • c. Both wiretapping and "bugging" • d. Mail covers

  33. 16. The term "eavesdropping" refers to: • a. Wiretapping only • b. "Bugging" only • c. Both wiretapping and "bugging" • d. Mail covers

  34. 17. A microphone which has the characteristics of requiring no power source to operate it is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aids is known as: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  35. 17. A microphone which has the characteristics of requiring no power source to operate it is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aids is known as: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  36. 18. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  37. 18. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is: • a. Carbon microphone • b. Dynamic microphone • c. Contact microphone • d. Parabolic microphone

  38. 19. Which of the following is not true with regard to electronic eavesdropping? • a. A listening device installed in a wire will cause a crackling sound, click, or other noise that can be heard on the line • b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment • c. All wiring should be traced out and accounted for in a countermeasures survey • d. In a countermeasures survey to detect electronic eavesdropping a physical search should be utilized as well as an electronic search

  39. 19. Which of the following is not true with regard to electronic eavesdropping? • a. A listening device installed in a wire will cause a crackling sound, click, or other noise that can be heard on the line • b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment • c. All wiring should be traced out and accounted for in a countermeasures survey • d. In a countermeasures survey to detect electronic eavesdropping a physical search should be utilized as well as an electronic search

  40. 20. In designing a proprietary information protection program, the area of greatest vulnerability is: • a. Personnel files • b. Marketing data • c. Employees • d. Computers

  41. 20. In designing a proprietary information protection program, the area of greatest vulnerability is: • a. Personnel files • b. Marketing data • c. Employees • d. Computers

  42. 21. A nonlinear junction detector is used to locate eavesdropping devices by: • a. Detecting the semi-conductor components which comprise their circuits • b. Recording changes in the voltage on a telephone line • c. Measuring the distance from a known point to the indicated location of a telephone line attachment • d. Detecting infrared emissions

  43. 21. A nonlinear junction detector is used to locate eavesdropping devices by: • a. Detecting the semi-conductor components which comprise their circuits • b. Recording changes in the voltage on a telephone line • c. Measuring the distance from a known point to the indicated location of a telephone line attachment • d. Detecting infrared emissions

  44. 22. Which of the following statements is incorrect with regard to an information security program? • a. A good information security program will provide absolute protection against an enemy spy • b. The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it • c. A trust relationship must be established and maintained with employees • d. The good will and compliance of employees is crucial for success

  45. 22. Which of the following statements is incorrect with regard to an information security program? • a. A good information security program will provide absolute protection against an enemy spy • b. The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it • c. A trust relationship must be established and maintained with employees • d. The good will and compliance of employees is crucial for success

  46. 23. A specially-constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as: • a. Parabolic microphone • b. Special audio device • c. Contact microphone • d. Surreptitious microphone

  47. 23. A specially-constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as: • a. Parabolic microphone • b. Special audio device • c. Contact microphone • d. Surreptitious microphone

  48. 24. "Social engineering" is: • a. The conversation involved in the beginning of a romantic relationship • b. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity • c. The subtle elicitation of information without revealing purpose of the call • d. The specific design of a business structure to facilitate the interaction of the inhabitants

  49. 24. "Social engineering" is: • a. The conversation involved in the beginning of a romantic relationship • b. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity • c. The subtle elicitation of information without revealing purpose of the call • d. The specific design of a business structure to facilitate the interaction of the inhabitants

  50. 25. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered? • a. You may have to expose the very secrets you are attempting to protect • b. The cost of the litigation may exceed the value of the secret information • c. You may lose a law case • d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

More Related