51 - 100 Getting Warmer Flashcards
Which of the following is not a correct statement, as a general rule, involving the protection of proprietary information?
A . As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
B . By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
C . Other than the employees, any other persons to be bound to secrecy must agree to be so bound
D . Any agreement to be bound must always be in writing and are not implied from acts
D
Which of the following methods could be used as a form of eavesdropping using a telephone instrument?
A . Wiring can be altered so the handset or receiver will act as an open microphone.
B . A radio transmitter can be concealed in the mouthpiece.
C . The infinity transmitter can be used.
D . Both band c.
E . All of the above.
E
A term used to indicate a method of disguising information so that it is unintelligible to those who should not obtain it is:
A . Interconnection decoy
B . Multiplexing
C . Scrambling
D . Mixed signal
E . None of the above
C
Which of the following is not true with regard to lock and key systems?
A . The locking system should be supplemented with other security devices.
B . Most key locks can be picked by an expert in a few minutes.
C . A high-quality pickproof lock is considered a positive bar to entry.
D . The lock is the most accepted and widely used security device of the basic safeguards in protecting installations.
E . Locks, regardless of quality or cost, should be considered as delay devices only.
C
A key element in the information asset protection (IAP) risk assessment process is a thorough study of existing and projected threats. What are the categories?
A . Historical, current and future threats
B . Man-made, natural and intentional
C . Intentional, natural and inadvertent threats
D . Internal, external and government
C
A flaw or weakness in an information system’s design, implementation, or operations and management, including policies, procedures, processes, and internal controls that could be exploited to violate the system’s security policy, is known as an:
A . Information systems vulnerability
B . Information systems threat
C . Information systems risk
D . Information systems failure
A
Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
A . 0.5 foot-candle
B . 1.0 foot-candle
C . 1.5 foot-candles
D . 2.0 foot-candles
B
One whose sexual desires are directed to both men and women is known as a:
A . Lesbian
B . Bisexual
C . Homosexual
D . Transvestite
E . None of the above
B
Which of the following is considered to be the most resistant to a blast explosion?
A . Steel-frame building walls
B . Thick brick or concrete walls
C . Thick earthen barricades
D . Thick reinforced concrete walls
E . Wire-reinforced glass windows
D
An employer may not question an applicant about:
A . An unsatisfactory interview
B . Unexplained gaps in employment history
C . An arrest for a crime against property
D . A conviction for a crime against property
C
An investigation that consists of checking the records of appropriate federal agencies for information bearing on the loyalty and suitability of a person under investigation is known as a(n):
A . FBI investigation
B . National Agency Check
C . Loyalty investigation
D . Background investigation
E . Full field investigation
B
The principle of the pin-tumbler lock can be traced back historically to:
A . Egyptians more than 4000 years ago
B . The Civil War period
C . The late eighteenth century
D . 1905
E . WorldWar I
A
The attitude or state of mind through which individuals are conscious of the existence of the security program and are persuaded that it is relevant to their own behavior is a concept known as:
A . Security motivation
B . Security awareness
C . Security consciousness
D . None of the above
B
Watery eyes, runny, nose, yawning, loss of appetite, irritability, tremors, panic, chills and sweating, cramps, and nausea would indicate withdrawal symptoms of:
A . Barbiturates
B . Stimulants
C . Heroin
D . Cocaine
E . LSD
C
The sensor that is used when light air turbulence, vibration, or motion is present outside the room is a(n):
A . Vibration detector
B . Microwave motion detector
C . Ultrasonic motion detector
D . Acoustic detector
E . None of the above
D
According to a 1979 survey by the American Society for Industrial Security, the number of organizations in the United States offering security courses is greater than:
A.50
B.75
C.150
D.180
E.250
D
Which one of the following substances is not an hallucinogen?
A . Lysergic acid diethylamide
B . Mescaline
C . Phencyclidine
D . Phencyclidine analogs
E . None of the above
E
Which of the following should not be included in the written investigative report of an applicant?
A . Derogatory information
B . Confidential sources of information
C . Results of a lie detector examination
D . Arrest records
E . None of the above
B
Which of the following is not a correct statement regarding chloral hydrate?
A . It is the oldest of the sleep-inducing drugs, also known as hypnotic drugs.
B . It is a liquid marketed in the form of syrups and soft gelatin capsules.
C . Its popularity decreased after the introduction of barbiturates.
D . Its main abuse is by young adults.
E . It has a bitter caustic taste and a slightly acrid odor.
D
In an investigation concerning regulations of common carriers in interstate commerce or investigation of railroad accidents, a good source of information would be the:
A . Federal Bureau of Investigation
B . Bureau of Customs
C . Federal Trade Commission
D . Interstate Commerce Commission
E . General Accounting Office
D