CHAPTER 4: PROTECTION OF SENSITIVE INFORMATION Flashcards
The purpose for employing an access control program includes:
a. To protect persons, materials, or information
b. To slow or speed up the rate of movement to, from, or within an establishment
c. To permit or deny entrance
d. Both a and c
e. All of the above
E
Identification and access control systems have the widest application of:
a. Manual identification systems
b. Magnetic readers
c. Biometric-based systems
d. Dielectric readers
e. None of the above
A
The performance requirements of any trustworthy system of identification include:
a. Resistance to surreptitious substitution or counterfeiting
b. Reliability
c. Validity
d. Both b and c
e. All of the above
E
A general defect of manual identification systems is that:
a. Many are made of plastic
b. Many do not have biometric characteristics on them
c. Once issued, they tend to remain valid indefinitely
d. They lack identifying colors
e. None of the above
C
Any formula, pattern, device, or compilation of information that is used in one’s business and that gives you an opportunity to gain an advantage over competitors who do not use it or know about it is:
a. A patent
b. A trade secret
c. A monopoly
d. Copyrighted material
e. None of the above
B
What is most likely the main reason for loss of sensitive information?
a. Industrial espionage
b. An employee’s loose lips
c. Inadvertent disclosure
d. Deliberate theft by an outsider
e. Both b and c
f. None of the above
E
Which of the following should be part of an effective information security program?
a. Preemployment screening
b. Nondisclosure agreements from employees
c. Employee awareness programs
d. Policy and procedural statements on the recognition, classification, and handling of sensitive information
e. All of the above
E
The primary tool of preemployment screening is the:
a. Application form
b. Interview
c. Polygraph
d. Investigator performing the interview
A
Which of the following is generally not allowed to be disclosed on an employment questionnaire?
a. Current residence
b. References
c. Prior employment
d. Prior arrests
e. None of the above
D
To be within the definition of a trade secret, sensitive information must meet which of the following criteria?
a. Individuals to whom it is disclosed must know that it is secret.
b. It must be identifiable.
c. It must not be already available in public sources.
d. There must be some obvious indication that the owner is attempting to prevent its unauthorized disclosure.
d. a, c, and d.
e. All of the above.
E
According to the “restatement of the law of torts,” a trade secret is:
a. All information about a company that the company desires to protect
b. Any formula, pattern, device, or compilation of information that is used in one’s business and that gives that business an opportunity to gain an advantage over competitors who do not know or use it
c. Information about a company that is registered with the US Patent Office
d. Both a and b
e. All of the above
B
A trade secret may be:
a. A formula for a chemical compound
b. A process of manufacturing materials
c. A pattern for a machine
d. A list of customers
e. All of the above
E
The characteristics of a trade secret as compared with other confidential information are:
a. Those business secrets that have been duly registered pursuant to the requirements of law
b. Continuous or consistent business applications of a secret not known to others, from the use of which some advantage is
gained by the user
c. Those business secrets that are fully protected in accordance with the Federal Privacy Act
d. Both a and c
e. All of the above
B
Which of the following is generally not true in regard to trade secrets?
a. The more a business narrowly defines what it regards as a secret, the easier it is to protect that body of information.
b. It is difficult to protect a trade secret that can be found in publicly accessible sources.
c. Secret information does have to be specifically identifiable.
d. Secret information must be effectively protected.
e. None of the above.
E
In regard to a trade secret, it may be decided that its disclosure by another was innocent, rather than wrongful, even in the case
where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:
a. The trade secret was not registered
b. The trade secret did not involve national defense information
c. The trade secret was not in current use
d. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information
e. All of the above
D
Proprietary information is:
a. Private information of a highly sensitive nature
b. Information that must be classified according to executive order of the US government
c. Sensitive information that is classified under federal regulations
d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly
e. None of the above
D
The class of person under a duty to safeguard a proprietary secret is known as:
a. Agent
b. Proprietary security employee
c. Fiduciary
d. Business associate
e. None of the above
C
It is important for employees to know whether confidential information is a trade secret, or some other confidential material, because:
a. If it is a trade secret, the employee may be prevented from disclosing it by injunction
b. If it is not a trade secret and it is disclosed, the employer must take action after the disclosure and must be able to prove some
actual damage in order to recover
c. If it is not a trade secret, the information, once disclosed, is no longer defendable
d. If it is not a trade secret, the information, once disclosed, cannot be further prevented from disclosure by an injunction
e. All of the above
E
Which of the following is not a correct statement as a general rule involving the protection of proprietary information?
a. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship.
b. By operation of common law, employees are presumed to be fiduciaries to the extent that they may not disclose secrets of their employers without authorization.
c. Other than the employees, any other persons to be bound to secrecy must agree to be so bound.
d. Any agreements to be bound must always be in writing and are not implied from acts.
D
To effectively involve the law for the protection of sensitive information, the owner of the proprietary information must be able
to show “objective indications of attempts to protect secrecy.” Which of the following has been recognized in the past as such an
indication?
a. Use of warning signs to alert employees to sensitive data and the places where it is stored
b. Separately storing sensitive information in security containers with the appropriate security precautions
c. Special instructions providing a “need-to-know” basis
d. Restrictions to nonemployee access to places containing sensitive information
e. All of the above
E
Which of the following should be made part of a proprietary information protection program?
a. Preemployment screening
b. Effective perimeter control system
c. Execution of patent and secrecy agreement
d. Paper and data control
e. Both a and c
f. All of the above
F
In designing a proprietary information protection program, the area of greatest vulnerability is:
a. Personnel files
b. Employees
c. Computers
d. Marketing data
e. Perimeter boundaries
B
In devising proprietary information procedures, which of the following is considered to be a main area of paper or document
vulnerability?
a. Comprehensive paper controls
b. A technical report system
c. Control and issue of notebooks
d. All of the above
e. None of the above
D
When a loss of proprietary information is discovered, which of the following steps should be taken first?
a. Attempt to recover the material
b. Attempt to apprehend the perpetrators
c. Assess economic damage
d. Reevaluate the protection system
e. All of the above
E
Which of the following would not be considered in the trade secret category?
a. Salary data
b. Market surveys
c. Personnel matters
d. Customer usage evaluations
e. All of the above
E
Litigations concerning former employees involving trade secrets have some problems. Which of the following is considered to be
such a problem?
a. The cost of litigations is too high, and the owner of the trade secret may lose
b. Litigation is a waste of time
c. The owner of the trade secret may have to expose the information that is being protected
d. Both a and c
e. All of the above
D
A trash cover is:
a. A sealed cover on a trash container
b. The process of examining one’s trash for information
c. Placing the company’s trash in a locked container
d. Both a and c
e. All of the above
B
Sound waves too high in frequency to be heard by the human ear, generally above 20 kHz, are known as:
a. High-frequency sound waves
b. Microwave waves
c. Ultrasonic waves
d. Short-frequency sound waves
e. None of the above
C
The process of combining a number of transmissions into one composite signal to be sent over one link is called:
a. Transmission integrity
b. Communication integration
c. A demultiplexer
d. Multiplexing
e. None of the above
D
Which of the following applies to the laser as a means of communication?
a. Line-of-sight transmission is necessary.
b. Poor weather conditions interfere with the beam.
c. It is practically impossible to intercept the beam without detection.
d. Both a and c.
e. All of the above.
E
Which of the following is not correct in regard to microwave transmissions?
a. Microwave signals penetrate fog and snow.
b. Microwave signals are transmitted in short radio waves.
c. A large number of microwave signals can be transmitted.
d. Microwave signals travel in curved lines.
e. Microwave signals are not affected by ordinary manmade noise.
f. None of the above.
D
Electromagnetic radiation is detectable electromagnetic energy that is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?
a. A current carrier device
b. Pneumatic cavity shielding
c. Tempest shielding
d. Pen register shielding
C
The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:
a. Bugging
b. Veiling
c. Tempest
d. All of the above
e. None of the above
C
A term used to indicate a method of disguising information so that it is unintelligible to those who should not obtain it is:
a. Interconnection decoy
b. Multiplexing
c. Scrambling
d. Mixed signal
e. None of the above
C
The most secure scrambler in common use is the:
a. Frequency inverter
b. Decoder
c. Laser beam
d. Vocoder
e. None of the above
D
The method used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:
a. Electronic surveillance
b. Phone bug
c. Wiretap
d. Pen register
e. None of the above
D
A small hidden microphone and a radio transmitter are generally known as:
a. A wiretap
b. A bug
c. A beeper
d. Electronic surveillance
e. All of the above
B
A specially constructed microphone attached directly to an objector surface to be protected, which responds only when the protected object or surface is disturbed, is known as a:
a. Parabolic microphone
b. Special audio microphone
c. Contact microphone
d. Surreptitious microphone
e. None of the above
C
A microphone with a disklike attachment that is used for listening to audio from great distances is known as a(n):
a. Contact microphone
b. Parabolic microphone
c. Ultrasonic microphone
d. Both a and c
e. None of the above
B
A microphone that is installed on a common wall adjacent to the target area when it is impractical or impossible to enter the target
area is known as a:
a. Carbon microphone
b. Parabolic microphone
c. Contact microphone
d. Dynamic microphone
e. None of the above
C
Which method of protection against telephone line eavesdropping is most reliable?
a. Don’t discuss sensitive information
b. Use a radio jammer
c. Use encryption equipment
d. Both a and c
e. Use an audio jammer
D
The unauthorized acquisition or dissemination by an employee of confidential data critical to his or her employer is known as:
a. Embezzlement
b. Larceny
c. Industrial espionage
d. Burglary
e. False pretenses
C
The term eavesdropping refers to:
a. Wiretapping
b. Bugging
c. Trash cover
d. Both a and b
e. All of the above
D
Which of the following methods could be used as a form of eavesdropping using a telephone instrument?
a. Wiring can be altered so the handset or receiver will act as an open microphone.
b. A radio transmitter can be concealed in the mouthpiece.
c. The infinity transmitter can be used.
d. Both b and c.
e. All of the above.
E
A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):
a. Contact microphone
b. Parabolic microphone
c. Dynamic microphone
d. Infinity microphone
e. None of the above
C
Installation of a wireless radio eavesdropping device usually consists of the following:
a. Transmitter and receiver
b. Power supply
c. Antenna
d. Microphone
e. Both a and d
f. All of the above
F
The frequency range best suited for a wireless microphone because it provides better security and lower interference is:
a. 25–50 mHz
b. 88–104 mHz
c. 88–120 mHz
d. 150 –174 mHz
e. None of the above
E
The control software of a private board exchange (PBX) can be accessed and compromised by calling the telephone number of a
device on the PBX from a computer and modem. The name of this PBX device is the:
a. Internal and remote signal port
b. Current carrier signaling port
c. Time-domain reflectometer
d. Remote maintenance access terminal
e. None of the above
D
Which of the following is not true regarding electronic eavesdropping?
a. An effective countermeasure to detect evidence of electronic eavesdropping in telephone equipment should be conducted by
a person who is technically familiar with such equipment.
b. An effective countermeasure would be to conduct a physical search as well as an electronic search.
c. All wiring should be traced and accounted for.
d. A listening device installed in a wire will cause a crackling sound, click, or other noise that can be heard on the line.
e. None of the above.
D
The first federal legislation that attempted to regulate electronic surveillance in the United States was enacted by Congress in:
a. 1910
b. 1924
c. 1934
d. 1968
e. 1971
C
The manufacture, distribution, possession, and advertising of wire or oral communication interception devices is prohibited by:
a. The First Amendment
b. The Fourth Amendment
c. The Federal Communications Act of 1934
d. The Omnibus Crime Control and Safe Streets Act of 1968
e. The FBI
D
The criminal punishment for violation of the wiretapping phases of the Omnibus Crime Control and Safe Streets Act of 1968 is:
a. A $10,000 fine
b. 6 months in jail and/or a $5000 fine
c. 1 year in jail and/or a $10,000 fine
d. 5 years in prison and/or a $10,000 fine
e. None of the above
D
Which of the following is not a requirement under the Omnibus Crime Control and Safe Streets Act of 1968 before a court may
give permission for an electronic surveillance?
a. The identity of the offender should be stated.
b. The crime must be any felony under federal law.
c. The place and location of the electronic surveillance must be stated.
d. Initial approval must be granted by the attorney general of the United States or by a specially designated attorney general.
e. All of the above.
B
Which of the following is provided for by the Omnibus Crime Control and Safe Streets Act of 1968?
a. It prohibits wiretapping or bugging unless a party to the intercepted conversation gives consent.
b. It prohibits the manufacture and distribution of oral communication interceptor devices.
c. Nonfederal law enforcement representatives are denied the right to make use of electronic surveillance unless there is a
state statute permitting it.
d. Both a and b.
e. All of the above.
E
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 requires that an approval for electronic surveillance must be
obtained from the:
a. Chief justice of the Supreme Court
b. Director of the FBI
c. Attorney general of the United States or any specially designated assistant attorney general
d. Director of the CIA
e. All of the above
C
Criminal violations involving theft of trade secrets could be covered by:
a. Statutes on theft of trade secrets
b. Bribery statutes involving trade secrets
c. Statutes on receipt of stolen property
d. Statues on criminal conspiracy
e. All of the above
E
The public statute passed to protect personal information in possession of federal agencies is:
a. The Espionage Statute
b. The Unauthorized Disclosure Act
c. The Omnibus Crime Control Act
d. The Privacy Act of 1974
e. None of the above
D
The Privacy Act of 1974 provides which of the following safeguards?
a. Permits individuals to gain access to certain information pertaining to themselves in federal agency records
b. Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
c. Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
d. Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual’s rights under the Privacy Act of 1974
e. All of the above
E
Which of the following would not be permitted to review a student’s record according to the Family Educational Rights and the Privacy Act of 1974?
a. Law enforcement officials
b. Other school officials
c. The school’s registrar’s office
d. All of the above
e. None of the above
A
Which of the following characteristics pertains to a good information management program?
a. An employee education program for those who utilize the classification system
b. Limited number of individuals who can initiate classification of information
c. Limitation of the duration during which the classification will remain in effect
d. All of the above
e. None of the above
D
What are the three most common methods of information loss to be guarded against?
a. Newspaper articles, magazine articles, television
b. Employee payroll, personnel matters, market surveys
c. Theft by an insider, inadvertent disclosure, industrial espionage
d. Employee hirings, magazine articles, industrial espionage
e. None of the above
C