51 - 100 Getting Warmer Flashcards

1
Q

Which of the following is not a correct statement, as a general rule, involving the protection of proprietary information?

A . As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
B . By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
C . Other than the employees, any other persons to be bound to secrecy must agree to be so bound
D . Any agreement to be bound must always be in writing and are not implied from acts

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following methods could be used as a form of eavesdropping using a telephone instrument?

A . Wiring can be altered so the handset or receiver will act as an open microphone.
B . A radio transmitter can be concealed in the mouthpiece.
C . The infinity transmitter can be used.
D . Both band c.
E . All of the above.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A term used to indicate a method of disguising information so that it is unintelligible to those who should not obtain it is:

A . Interconnection decoy
B . Multiplexing
C . Scrambling
D . Mixed signal
E . None of the above

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not true with regard to lock and key systems?

A . The locking system should be supplemented with other security devices.
B . Most key locks can be picked by an expert in a few minutes.
C . A high-quality pickproof lock is considered a positive bar to entry.
D . The lock is the most accepted and widely used security device of the basic safeguards in protecting installations.
E . Locks, regardless of quality or cost, should be considered as delay devices only.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A key element in the information asset protection (IAP) risk assessment process is a thorough study of existing and projected threats. What are the categories?

A . Historical, current and future threats
B . Man-made, natural and intentional
C . Intentional, natural and inadvertent threats
D . Internal, external and government

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A flaw or weakness in an information system’s design, implementation, or operations and management, including policies, procedures, processes, and internal controls that could be exploited to violate the system’s security policy, is known as an:

A . Information systems vulnerability
B . Information systems threat
C . Information systems risk
D . Information systems failure

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

A . 0.5 foot-candle
B . 1.0 foot-candle
C . 1.5 foot-candles
D . 2.0 foot-candles

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One whose sexual desires are directed to both men and women is known as a:

A . Lesbian
B . Bisexual
C . Homosexual
D . Transvestite
E . None of the above

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered to be the most resistant to a blast explosion?

A . Steel-frame building walls
B . Thick brick or concrete walls
C . Thick earthen barricades
D . Thick reinforced concrete walls
E . Wire-reinforced glass windows

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An employer may not question an applicant about:

A . An unsatisfactory interview
B . Unexplained gaps in employment history
C . An arrest for a crime against property
D . A conviction for a crime against property

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An investigation that consists of checking the records of appropriate federal agencies for information bearing on the loyalty and suitability of a person under investigation is known as a(n):

A . FBI investigation
B . National Agency Check
C . Loyalty investigation
D . Background investigation
E . Full field investigation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The principle of the pin-tumbler lock can be traced back historically to:

A . Egyptians more than 4000 years ago
B . The Civil War period
C . The late eighteenth century
D . 1905
E . WorldWar I

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The attitude or state of mind through which individuals are conscious of the existence of the security program and are persuaded that it is relevant to their own behavior is a concept known as:

A . Security motivation
B . Security awareness
C . Security consciousness
D . None of the above

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Watery eyes, runny, nose, yawning, loss of appetite, irritability, tremors, panic, chills and sweating, cramps, and nausea would indicate withdrawal symptoms of:

A . Barbiturates
B . Stimulants
C . Heroin
D . Cocaine
E . LSD

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The sensor that is used when light air turbulence, vibration, or motion is present outside the room is a(n):

A . Vibration detector
B . Microwave motion detector
C . Ultrasonic motion detector
D . Acoustic detector
E . None of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

According to a 1979 survey by the American Society for Industrial Security, the number of organizations in the United States offering security courses is greater than:

A.50
B.75
C.150
D.180
E.250

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one of the following substances is not an hallucinogen?

A . Lysergic acid diethylamide
B . Mescaline
C . Phencyclidine
D . Phencyclidine analogs
E . None of the above

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following should not be included in the written investigative report of an applicant?

A . Derogatory information
B . Confidential sources of information
C . Results of a lie detector examination
D . Arrest records
E . None of the above

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is not a correct statement regarding chloral hydrate?

A . It is the oldest of the sleep-inducing drugs, also known as hypnotic drugs.
B . It is a liquid marketed in the form of syrups and soft gelatin capsules.
C . Its popularity decreased after the introduction of barbiturates.
D . Its main abuse is by young adults.
E . It has a bitter caustic taste and a slightly acrid odor.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In an investigation concerning regulations of common carriers in interstate commerce or investigation of railroad accidents, a good source of information would be the:

A . Federal Bureau of Investigation
B . Bureau of Customs
C . Federal Trade Commission
D . Interstate Commerce Commission
E . General Accounting Office

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The designation that shall be applied only to information or material that unauthorized disclosure could reasonably be expected to cause serious damage to national security is:

A . Restricted
B . Secret
C . Confidential
D . Top secret
E . Unauthorized disclosure

A

B

22
Q

Which of the following is generally not allowed to be disclosed on an employment questionnaire?

A . Current residence
B . References
C . Prior employment
D . Prior arrests
E . None of the above

A

D

23
Q

The theft triangle consists of the following components:

A . Motivation, skill, and opportunity
B . Opportunity, desire, and skill
C . Motivation, opportunity, and rationalization (desire)
D . Rationalization, skill, and opportunity
E . None of the above

A

C

24
Q

Marijuana and other cannabis products are usually administered by:

A . Sniffing
B . Injection
C . Rubbing into the skin
D . Smoking
E . “Mainstreaming”

A

D

25
Q

Excluding the top guard, standard barbed-wire fencing that is intended to prevent human trespassing should not be less than:

A. 6 feet high
B. 7 feet high
C. 8 feet high
D. 9 feet high
E. 10 feet high

A

B

26
Q

To obtain information concerning marriage licenses, an investigator would contact the:

A . Appropriate health department
B . Tax bureau
C . Bureau of Vital Statistics
D . Appropriate court
E . Social Security Office

A

C

27
Q

Which of the following statements is not correct regarding the polygraph?

A . The polygraph is not a lie detector.
B . The polygraph does not automatically register truth or falsehood.
C . A polygraph test is conclusive.
D . Historically, polygraphs have more often been used to establish innocence rather than to prove guilt.
E . None of the above.

A

C

28
Q

A background investigation for a security clearance consists of:

A . Checking college attendance, if attended
B . Verifying service in the armed forces
C . Interviewing character references
D . Both b and c
E . All of the above

A

E

29
Q

The type of sensor that is designed to place a current-carrying conductor between an intruder and an area to be protected is known as a(n):

A . Vibration sensor
B . Microwave sensor
C . Capacitance sensor
D . Acoustic sensor
E . Electromechanical sensor

A

E

30
Q

Frustration and aggression may be caused by:

A . Increasing debts
B . Personal problems
C . Lack of recognition by superiors
D . Dishonest supervisors
E . The supervisor’s lack of consideration in dealing with his or her employees or by unrealistic company policies
F . All of the above

A

E

31
Q

An employee should be questioned:

A . With the door open
B . With co-workers present
C . Behind a closed door
D . Behind a closed and locked door

A

C

32
Q

Which of the following is not a known advantage of the establishment of restricted areas?

A . They provide an increase in security without slowdown in operation.
B . They provide increased security through buffer zones.
C . They allow for varying degrees of security as required.
D . They improve overall security.
E . They make it possible to have security compatible with operational requirements.

A

A

33
Q

A microphone that is installed on a common wall adjacent to the target area when it is impractical or impossible to enter the target area is known as a:

A . Carbon microphone
B . Parabolic microphone
C . Contact microphone
D . Dynamic microphone
E . None of the above

A

C

34
Q

Which of the following principles of protective lighting is not correct?

A . Lighting should be used with other measures, such as fixed security posts, fences, etc., and not used alone.
B . A large amount of light should be focused on security patrol routes.
C . Adequate, even light should be used on bordering areas.
D . There should be a high brightness contrast between an intruder and the background.
E . Glaring lights should be directed at the eyes of an intruder.

A

B

35
Q

When an individual is eligible to have access to classified information, this is called:

A . A security clearance
B . A Q clearance
C . An FBI clearance
D . A VIP clearance
E . A field operative clearance

A

A

36
Q

The physiological adaptation of the body to the presence of a dmg whereby the body develops a continuing need for the dmg is known as:

A . Tolerance
B . Addiction
C . Psychological dependence
D . Physical dependence
E . Habituation

A

D

37
Q

Which of the following does not pertain to the foil-type sensor?

A . The cost of installation is cheap.
B . The cost of the sensor is cheap.
C . It acts as a psychological deterrent.
D . It is subjected to false alarms because of breaks.
E . Small cracks in the tape, or foil, will disable it.
F . All of the above.

A

A

38
Q

The practice of having at least two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, present during any operation that affords access to a sensitive area is referred to as a(n):

A . Two-man access procedure
B . Two-man control rule
C . Two-man rule
D . Controlled access rule
E . Information security rule
F . None of the above

A

C

39
Q

Which of the following is not correct regarding a security education program?

A . Many people are naive and trusting.
B . All installation personnel must be made aware of the constant threat of breaches of security.
C . Structural aids to security are valueless without active support of all personnel.
D . Security consciousness is an inherent state of mind.
E . None of the above.

A

D

40
Q

Safes that are UL classified must be anchored to the floor or must weigh at least:

A . 750lbs.
B . 1000 lbs.
C . 1500 lbs.
D . 2000lbs
E . 3000 lbs.

A

A

41
Q

The most vulnerable link in any identification system is:

A . Poor quality of identification badges
B . Educational background of security officers
C . Not enough security officers assigned to control posts
D . Identification cards are too small
E . Perfunctory performance of duty
F . None of the above

A

A

42
Q

The roof of a vault should be at least:

A . 3 inches thick
B . 4 inches thick
C . 5 inches thick
D . 6 inches thick
E . 8 inches thick

A

D

43
Q

Which of the following is not a requirement under the Omnibus Crime Control and Safe Streets Act of 1968 before a court may give permission for an electronic surveillance?

A . The identity of the offender should be stated.
B . The crime must be any felony under federal law.
C . The place and location of the electronic surveillance must be stated.
D . Initial approval must be granted by the attorney general of the United States or by a specially designated attorney general.
E . All of the above.

A

B

44
Q

A standard barbed-wire, twisted, double-strand fence has __ point barbs spaced an equal distance apart.

A.1
B.2
C.3
D.4
E.5

A

D

45
Q

Cocaine is placed in which of the following controlled substance schedules?

A . Schedule I
B . Schedule II
C . Schedule III
D . Schedule IV
E . Schedule V

A

B

46
Q

The age discrimination in the Employment Act of 1967 bans discrimination against workers or applicants who are:

A.Atleast35butlessthan60
B.Atleast45butlessthan70
C.Atleast50butlessthan70 D.Atleast30butlessthan60 E.Atleast40butlessthan65

A

E

47
Q

Information regarding the revelation of significant military plans or intelligence operations should be classified as:

A . Restricted
B . Secret
C . Confidential
D . Top secret
E . Cosmic

A

B

48
Q

Which of the following characteristics describes stimulants as a controlled substance?

A . Younger individuals who use stimulants for a euphoric effect often go on to experiment with other drugs of abuse.
B . Users tend to rely on stimulants to feel stronger, more decisive and self-possessed. C . Stimulants are usually administered by injection or taken orally.
D . Heavy use could result in psychological dependence.
E . Tolerance develops from heavy use.
F . All of the above.

A

F

49
Q

Competitive intelligence gathering is a legitimate activity that is engaged in by many firms throughout the world.
The most important function of competitive intelligence is to:

A . Alert senior management to changes in protocol in foreign countries
B . Alert senior management as to the personal habits of competitive
C . senior management
D . Alert government intelligence agencies to marketplace changes
E . Alert senior management to marketplace changes in order to prevent surprise
F. All of the above

A

D

50
Q

Which of the following is not a legitimate purpose of an investigation for employee misconduct?

A . To determine whether company rules have been violated
B . To ascertain whether company policies have been violated
C . To catalog information about employees that might be derogatory for future use
D . To determine if state laws have been violated
E . To determine if federal laws have been violated

A

C