Dump 2 Flashcards

1
Q

Of all those with mental disorders, the most dangerous subject to handle is:
a. One suffering hysteria
b. A paranoid psychotic
c. A neurotic
d. One suffering phobia
e. Schizophrenic

A

B – A paranoid psychotic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mental disorders may be determined by symptoms. Which of the following is such a symptom?
a. Sudden changes in behavior
b. Behavior that is not harmonious with a situation
c. Unduly prolonged depression
d. All of the above
e. None of the above

A

D – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In handling a mentally disturbed person, one should:
a. Take a strong position as the boss
b. Assume a calm and friendly position
c. Leave the impression he or she has control of the situation
d. All of the above
e. None of the above

A

B – Assume a calm and friendly position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is true in handling persons with mental disorders?
a. Don’t deceive them
b. Don’t become involved in their personal problems
c. Where physical restraint is required, use two officers
d. All of the above
e. None of the above

A

D – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The purpose for employing an access control program includes:
a. To protect persons, materials, or information
b. To slow or speed up the rate of movement to, from, or within an establishment
c. To permit or deny entrance
d. Both A and C
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identification and access control systems have the widest application of:
a. Manual identification systems
b. Magnetic readers
c. Biometric-based systems
d. Dielectric readers
e. None of the above

A

A – Manual identification systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The performance requirements of any trustworthy system of identification includes:
a. Resistance to surreptitious substitution or counterfeiting
b. Reliability
c. Validity
d. Both B and C
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A general defect of manual identification systems is that:
a. Many are made of plastic
b. Many do not have biometric characteristics on them
c. Once issued, they tend to remain valid indefinitely
d. They lack identifying colors
e. None of the above

A

C – Once issued, they tend to remain valid indefinitely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Any formula, pattern, device, or compilation of information that is used in one’s business and that gives you an opportunity to gain an advantage over competitors who do not use it or know about it is:
a. A patent
b. A trade secret
c. A monopoly
d. Copyrighted material
e. None of the above

A

B – A trade secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is most likely the main reason for loss of sensitive information?
a. Industrial espionage
b. An employee’s loose lips
c. Inadvertent disclosure
d. Deliberate theft by an outsider
e. Both B and C
f. None of the above

A

E – Both B and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following should be part of an effective information security program?
a. Pre-employment screening
b. Nondisclosure agreements from employees
c. Employee awareness programs
d. Policy and procedural statements on the recognition, classification, and handling of sensitive information
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The primary tool of pre-employment screening is the:
a. Application form
b. Interview
c. Polygraph
d. Investigator performing the interview

A

A – Application form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is generally not allowed to be disclosed on an employment questionnaire?
a. Current residence
b. References
c. Prior employment
d. Prior arrests
e. None of the above

A

D – Prior arrests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To be within the definition of a trade secret, sensitive information must meet which of the following criteria?
a. Individuals to whom it is disclosed must know it is secret
b. It must be identifiable
c. It must not be already available in public sources
d. There must be some obvious indication that the owner is attempting to prevent its unauthorized disclosure
e. A, C and D
f. All of the above

A

E – a, c and d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

According to the “restatement of the law of torts,” a trade secret is:
a. All information about a company that the company desires to protect
b. Any formula, pattern, device, or compilation of information that is used in one’s business and that gives that business an opportunity to gain an advantage over competitors who do not know or use it
c. Information about a company that is registered with the U.S. Patent Office
d. Both A and B
e. All of the above

A

B – Any formula, pattern, device, or compilation of information that is used in one’s business and that gives that business an opportunity to gain an advantage over competitors who do not know or use it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A trade secret may be:
a. A formula for a chemical compound
b. A process of manufacturing materials
c. A pattern for a machine
d. A list of customers
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The characteristics of a trade secret as compared with other confidential information are:
a. Those business secrets that have been duly registered pursuant to the requirements of law
b. Continuous or consistent business applications of a secret not known to others, from the sue of which some advantage is gained by the user
c. Those business secrets that are fully protected in accordance with the Federal Privacy Act
d. Both A and C
e. All of the above

A

B – Continuous or consistent business applications of a secret not known to others, from the use of which some advantage is gained by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is generally not true in regard to trade secrets?
a. The more a business narrowly defines what it regards as a secret, the easier it is to protect that body of information
b. It is difficult to protect a trade secret that can be found in publicly accessible sources
c. Secret information does have to be specifically identifiable
d. Secret information must be effectively protected
e. None of the above

A

E – None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In regard to a trade secret, it may be decided that its disclosure by another was innocent, rather than wrongful, even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:
a. The trade secret was not registered
b. The trade secret did not involve national defense information
c. The trade secret was not in current use
d. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information
e. All of the above

A

D – There is absence of evidence that an owner has taken reasonable precautions to protect confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Proprietary information is:
a. Private information of a highly sensitive nature
b. Information that must be classified according to executive order of the U.S. Government
c. Sensitive information that is classified according to executive order of the U.S. Government
d. Anything that an enterprise considers relevant to its status or operation

A

D – Anything that an enterprise considers relevant to its status or opera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The class of person under a duty to safeguard a proprietary secret is known as a(n):
a. Agent
b. Proprietary security employee
c. Fiduciary
d. Business associate
e. None of the above

A

C – Fiduciary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is important for employees to know whether confidential information is a trade secret, or some other confidential material, because:
a. If it is a trade secret, the employee may be prevented from disclosing it by injunction
b. If not a trade secret and it is disclosed, the employer must take action after the disclosure and must be able to prove some actual damage in order to recover
c. If not a trade secret, the information once disclosed is no longer defendable
d. If not a trade secret, the information once disclosed cannot be further prevented from disclosure by an injunction
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is not a correct statement as a general rule involving the protection of proprietary information?
a. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
b. By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
c. Other than the employees, any other persons to be bound to secrecy must agree to be so bound
d. Any agreements to be bound must always be in writing and are not implied from acts

A

D – Any agreements to be bound must always be in writing and not implied from acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To effectively involve the law for the protection of sensitive information, the owner of the proprietary information must be able to show “objective indications of attempts to protect secrecy.” Which of the following has been recognized in the past as such an indication?
a. Use of warning signs to alert employees to sensitive data and the places it is stored
b. Separately storing sensitive information in security containers with the appropriate security precautions
c. special instructions providing a “need-to-know” basis
d. restrictions to nonemployee access to places containing sensitive information
e. all of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following should be made part of a proprietary information protection program?
a. Pre-employment screening
b. Effective perimeter control system
c. Execution of patent and secrecy agreement
d. Paper and data control
e. Both A and C
f. All of the above

A

F – All of the above

26
Q

In designing a proprietary information protection program, the area of greatest vulnerability is:
a. Personnel files
b. Employees
c. Computers
d. Marketing data
e. Perimeter boundaries

A

B – Employees

27
Q

In devising proprietary information procedures, which of the following is considered to be a main area of paper or document vulnerability?
a. Comprehensive paper controls
b. A technical report system
c. Control and issue of notebooks
d. All of the above
e. None of the above

A

B – A technical report system

28
Q

When a loss of proprietary information is discovered, which of the following steps should be taken first?
a. Attempt to recover the material
b. Attempt to apprehend the perpetrators
c. Assess economic damage
d. Re-evaluate the protection system
e. All of the above

A

E – All of the above

29
Q

Which of the following would not be considered in the “trade secret” category?
a. Salary data
b. Market surveys
c. Personnel matters
d. Customer usage evaluations
e. All of the above

A

E – All of the above

30
Q

Litigations concerning former employees involving trade secrets have some problems. Which of the following is considered to be such a problem?
a. The cost of litigations is too high and the owner of the trade secret may lose
b. Litigation is a waste of time
c. The owner of the trade secret may have to expose the information that is being protected
d. Both A and C
e. All of the above

A

D – Both A and C

31
Q

A “trash cover” is:
a. A sealed cover on a trash container
b. The process of examining one’s trash for information
c. Placing the company’s trash in a locked container
d. Both A and C
e. All of the above

A

B – The process of examining one’s trash for information

32
Q

Sound waves too high in frequency to be heard by the human ear, generally above 20 kHz area known as:
a. High-frequency sound waves
b. Microwave waves
c. Ultrasonic waves
d. Short-frequency sound waves
e. None of the above

A

C – Ultrasonic waves

33
Q

The process of combining a number of transmissions into one composite signal to be sent over one link is called:
a. Transmission integrity
b. Communication integration
c. A demultiplexer
d. Multiplexing
e. None of the above

A

D – Multiplexing

34
Q

Which of the following applies to the laser as a means of communication?
a. Lie of sight transmission is necessary
b. Poor weather conditions interfere with the beam
c. It is practically impossible to intercept the beam without detection
d. Both A and C
e. All of the above

A

E – All of the above

35
Q

Which of the following is not correct in regard to microwave transmissions?
a. Microwave signals penetrate fog and snow
b. Microwave signals are transmitted in short radio waves
c. A large number of microwave signals can be transmitted
d. Microwave signals travel in curved lines
e. Microwave signals are not affected by ordinary man-made noise
f. None of the above

A

D – Microwave signals travel in curved lines

36
Q

Electromagnetic radiation is detectable electromagnetic energy that is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?
a. A current carrier device
b. Pneumatic cavity shielding
c. Tempest shielding
d. Pen register shielding

A

C – Tempest shielding

37
Q

The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:
a. Bugging
b. Veiling
c. Tempest
d. All of the above
e. None of the above

A

C – Tempest

38
Q

A term used to indicate a method of disguising information so that it is unintelligible to those who should not obtain it is:
a. Interconnection decoy
b. Multiplexing
c. Scrambling
d. Mixed signal
e. None of the above

A

C – Scrambling

39
Q

The most secure scrambler in common use is the:
a. Frequency inverter
b. Decoder
c. Laser beam
d. Vocoder
e. None of the above

A

D – Vocoder

40
Q

The method used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:
a. Electronic surveillance
b. Phone bug
c. Wiretap
d. Pen register
e. None of the above

A

D – Pen register

41
Q

A small hidden microphone and a radio transmitter are generally known as:
a. A wiretap
b. A bug
c. A beeper
d. Electronic surveillance
e. All of the above

A

B – A bug

42
Q

A specially constructed microphone attached directly to an object or surface to be protected, which responds only when the protected object or surface is disturbed, is known as:
a. Parabolic microphone
b. Special audio microphone
c. Contact microphone
d. None of the above

A

C – Surreptitious microphone

43
Q

A microphone with a disklike attachment that is used for listening to audio from great distances is known as a(n):
a. Contact microphone
b. Parabolic microphone
c. Ultrasonic microphone
d. Both A and C
e. None of the above

A

B – Parabolic microphone

44
Q

A microphone that is installed on a common wall adjacent to the target area when it is impractical or impossible to enter the target area is known as a:
a. Carbon microphone
b. Parabolic microphone
c. Contact microphone
d. Dynamic microphone
e. None of the above

A

C – Contact microphone

45
Q

Which method of protection against telephone line eavesdropping is most reliable?
a. Don’t discuss sensitive information
b. Use a radio jammer
c. Use encryption equipment
d. Both A and C
e. Use an audio jammer

A

D – Both A and C

46
Q

The unauthorized acquisition or dissemination by an employee of confidential data critical to his or her employer is known as:
a. Embezzlement
b. Larceny
c. Industrial espionage
d. Burglary
e. False pretenses

A

C – Industrial espionage

47
Q

The term “eavesdropping” refers to:
a. Wiretapping
b. Bugging
c. Trash cover
d. Both A and C
e. All of the above

A

D – Both A and C

48
Q

Which of the following methods could be used as a form of eavesdropping using a telephone instrument?
a. Wiring can be altered so the handset or receiver will act as an open microphone
b. A radio transmitter can be concealed in the mouthpiece
c. The infinity transmitter can be used
d. Both B and C
e. All of the above

A

E – All of the above

49
Q

A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):
a. Contact microphone
b. Parabolic microphone
c. Dynamic microphone
d. Infinity microphone
e. None of the above

A

C – Dynamic microphone

50
Q

Installation of a wireless radio eavesdropping device usually consists of the following:
a. Transmitter and receiver
b. Power supply
c. Antenna
d. Microphone
e. Both A and D
f. All of the above

A

F – All of the above

51
Q

The frequency range best suited for a wireless microphone because it provides better security and lower interference is:
a. 25-50 mHz
b. 88-105 mHz
c. 88-120 mHz
d. 150-174 mHz
e. None of the above

A

E – None of the above

52
Q

The control software of a private board exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:
a. Internal and remote signal port
b. Current carrier signaling port
c. Time domain reflectometer
d. Remote maintenance access terminal
e. None of the above

A

D – Remote maintenance access terminal

53
Q

Which of the following is not true regarding electronic eavesdropping?
a. An effective countermeasure to detect evidence of electronic eavesdropping in telephone equipment should be conducted by a person who is technically familiar with such equipment.
b. An effective countermeasure would be to conduct a physical search as well as an electronic search
c. All wiring should be traced and accounted for
d. A listening device installed in a wire will cause a crackling sound, click, or other noise that can be heard on the line
e. None of the above

A

D – A listening device installed in a wire will cause a crackling sound, click, or other noise that can be heard on the line

54
Q

The first federal legislation that attempted to regulate electronic surveillance in the United States was enacted by Congress in:
a. 1910
b. 1924
c. 1934
d. 1968
e. 1971

A

C – 1934

55
Q

The manufacture, distribution, possession, and advertising of wire or oral communication interception devices is prohibited by:
a. The First Amendment
b. The Fourth Amendment
c. The Federal Communications Act of 1934
d. The Omnibus Crime Control and Safe Streets Act of 1968
e. The FBI

A

D – The Omnibus Crime Control and Safe Streets Act of 1968

56
Q

The criminal punishment for violation of the wiretapping phases of the Omnibus Crime Control and Safe Streets Act of 1968 is:
a. A $10,000 fine
b. 6 months in jail and/or a $5000 fine
c. 1 year in jail and/or a $10,000 fine
d. None of the above

A

D – 5 years in prison and/or a $10,000 fine

57
Q

Which of the following is not a requirement under the Omnibus Crime Control and Safe Streets Act of 1968 before a court may give permission for an electronic surveillance?
a. The identity of the offender should be stated
b. The crime must be any felony under federal law
c. The place and location of the electronic surveillance must be stated
d. Initial approval must be granted by the attorney general of the United States or by a specially designated attorney general
e. All of the above

A

B – The crime must be any felony under federal law

58
Q

Which of the following is provided for by the Omnibus Crime Control and Safe Streets Act of 1968?
a. It prohibits wiretapping or bugging unless a party to the intercepted conversation gives consent
b. It prohibits the manufacture and distribution of oral communication interceptor devices
c. Nonfederal law enforcement representatives are denied the right to make use of electronic surveillance unless there is a state statue permitting it.
d. Both A and. B
e. All of the above

A

E – All of the above

59
Q

Title III of the Omnibus Crime Control and Safe Streets Act of 1968 requires that an approval for electronic surveillance must be obtained from the:
a. Chief Justice of the Supreme Court
b. Director of the FBI
c. Attorney general of the United States or any specially designated assistant Attorney General
d. Director of the CIA
e. All of the above

A

C – Attorney general of the United States or any specially designated assistant attorney general

60
Q

Criminal violations involving theft of trade secrets could be covered by:
a. Theft of trade secrets statues
b. Bribery statues involving trade secrets
c. Receipt of stolen property statues
d. Criminal conspiracy statues
e. All of the above

A

E – All of the above