Dump 3 Flashcards
The public statue passed to protect personal information in possession of federal agencies is:
a. The Espionage Statue
b. The Unauthorized Disclosure Act
c. The Omnibus Crime Control Act
d. The Privacy Act of 1974
e. None of the above
D – The Privacy Act of 1974
The Privacy Act of 1974 provides which of the following safeguards?
a. Permits individuals to gain access to certain information pertaining to themselves in federal agency records
b. Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
c. Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
d. Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual’s rights under the Privacy Act of 1974
e. All of the above
E – All of the above
Which of the following would not be permitted to review a student’s record according to the Family Educational Rights and the Privacy Act of 1974?
a. Law enforcement officials
b. Other school officials
c. The school’s registrar office
d. All of the above
e. None of the above
A – Law enforcement officials
Which of the following characteristics pertains to a good information management program?
a. An employee education program for those who utilize the classification system
b. Limited number of individuals who can initiate classification of information
c. Limitation of the duration during which the classification will remain in effect
d. All of the above
e. None of the above
D – All of the above
What are the three most common methods of information loss to be guarded against?
a. Newspaper articles, magazine articles, television
b. Employee payroll, personnel matters, market surveys
c. Theft by an insider, inadvertent disclosure, industrial espionage
d. Employee hirings, magazine articles, industrial espionage
e. None of the above
C – Theft by an insider, inadvertent disclosure, industrial espionage
The elements of an information security program include:
a. Informing employees that the information is to be protected
b. Establishing the use of patent or nondisclosure agreements
c. Designation of certain information as sensitive
d. Providing the means for employees to protect sensitive information
e. All of the above
E – All of the above
Which of the following statements is not true in regard to an information security program?
a. The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
b. The protection afforded against losses by either internal or external sources is, at best, limited.
c. A good information security program will provide total protection from industrial espionage
d. A trust relationship must be established and maintained with employees
e. The good will and compliance of employees is crucial for success
C – A good information security program will provide total protection from industrial espionage
Vital records normally constitute what percentage of the company’s total records?
a. 2 percent
b. 5 percent
c. 10 percent
d. 15 percent
e. 20 percent
A – 2 percent
Which of the following is considered to be an approved method of protecting vital records?
a. On-site storage in vaults or safes
b. Protection of original vital records
c. Natural dispersal within an outside organization
d. Planned dispersal of copies of vial records
e. All of the above
E – All of the above
The term “social engineering” is:
a. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity
b. The subtle elicitation of information without revealing the true purpose of the call
c. The specific design of a business structure to facilitate the interaction of the inhabitants
d. Both A and C
e. None of the above
B – The subtle elicitation of information without revealing the interaction of the inhabitants
Competitive intelligence gathering is a legitimate activity that is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:
a. Alert senior management to changes in protocol in foreign countries
b. Alert senior management as to the personal habits of competitive senior management
c. Alert government intelligence agencies to marketplace changes
d. Alert senior management to marketplace changes in order to prevent surprise
e. All of the above
D – Alert government intelligence agencies to marketplace changes
The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:
a. Department of Commerce
b. Central Intelligence Agency
c. Department of Justice
d. Department of Labor
e. None of the above
B – Central Intelligence Agency
The overall policy guidance for the defense Industrial Security Program is provided by:
a. The FBI
b. The Deputy Undersecretary of Defense for Policy
c. The Assistant Chief of Staff in Intelligence
d. The defense Intelligence Agency
e. None of the above
B – The Deputy Undersecretary of Defense for Policy
The Defense Industrial Security Program on behalf of all user agencies is administrated by the:
a. Director, Defense Investigative Service
b. Comptroller, Assistant Secretary of Defense
c. Deputy Undersecretary of Defense for Policy
d. Defense Industrial Security Clearance Office
e. None of the above
A – Director, Defense Investigative Service
The executive order that applies to classified information is:
a. 1044
b. 1066
c. 12065
d. 12523
e. 14084
C – E.O. 12065
A controlled area established to safeguard classified material that, because of its size or nature, cannot be adequately protected by other prescribed safeguards is termed to be:
a. a restricted area
b. a classified area
c. a closed area
d. a limited area
e. none of the above
C – A closed area
The DIS region office under the support of the director of industrial security that has jurisdiction over the geographical area in which a facility is located is called the:
a. Regional Security Office
b. Division Security Office
c. Clearance Office
d. Cognizant Security Office
e. None of the above
D – Cognizant Security Office
Technical and intelligence information derived from foreign communications by other than the intended recipient is known as:
a. Restricted data
b. Communications intelligence
c. Classified security matters
d. Highly confidential
e. None of the above
B – Communications intelligence
The designation that should be applied to information or material showing unauthorized disclosure that could reasonably be expected to cause damage to national security is:
a. Restricted
b. Top Secret
c. Confidential
d. Unauthorized disclosure
e. None of the above
C – Confidential
Technical information used for training, maintenance, and inspection of classified military munitions of war would be classified as:
a. Restricted
b. Classified
c. Top secret
d. Confidential
e. Cosmic
D – Confidential
A designation or marking that identifies classified operational keying material and that indicates the material requiring special consideration with respect to access, storage, and handling is:
a. Cosmic
b. Special
c. Crypto
d. Communications intelligence
e. Red flagged
D – Communications intelligence
The portion of internal security that is concerned with the protection of classified information in the hands of U.S. industry is called:
a. Information security
b. Classified security
c. National security
d. Industrial security
e. Communications security
D – Industrial security
The result of any system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure of information and is authorized by executive order or statute is called:
a. Computer security
b. Industrial security
c. Personnel security
d. Communications security
e. Information security
E – Information security