Theft Of Data And Intellectual Property Flashcards

1
Q

Employees are often willing to abide by nondisclosure agreements, but they sometimes do not understand that the information they are communicating might be confidential.

A. True
B. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the process of data minimization, organizations protect against theft of proprietary information by collecting and storing only the amount of information necessary for employees to perform a given task.

A. True
B. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a common avenue through which proprietary company information is compromised?

A. Company website
B. Publications
C. Speeches by executives
D. All of the above

A

D. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a common method used by fraudsters to physically infiltrate and spy on organizations?

A. Pose as a contractor
B. Fabricate or steal an employee badge
C. Secure a position as an employee
D. All of the above

A

D. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a recommended method for safeguarding an organization’s proprietary information?

A. Classifying data into categories according to value and sensitivity levels
B. Creating an incident response plan after a data breach occurs
C. Constructing a quiet room to prevent eavesdropping
D. Changing locks and reprogramming door access codes regularly

A

B. Creating an incident response plan after a data breach occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Publicly available information that anyone can lawfully obtain by request, purchase, or observation is known as which of the following?

A. Wide-source information
B. Free-source information
C. Confidential-source information
D. Open-source information

A

D. Open-source information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The primary reason for a company’s management to construct an electronically and acoustically shielded quiet room is to protect data hosted on the company’s computer servers and other sensitive electronic devices.

A. True
B. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. He is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of:

A. Scavenging
B. Shoulder surfing
C. Dumpster diving
D. Spoofing

A

A. Scavenging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following should be the first step that the task force takes?

A. Determine what information should be protected.
B. Institute an encryption policy.
C. Shred sensitive documents.
D. Develop an employee awareness program.

A

A. Determine what information should be protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When should an employee be made aware of the need to maintain the confidentiality of an organization’s proprietary information, as well as which information is considered confidential?

A. During an exit interview
B. Upon being hired
C. When signing a nondisclosure agreement
D. All of the above

A

D. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following BEST illustrates the concept of human intelligence?

A. A corporate spy creates a deceptive website that tricks employees from a competing company into divulging confidential information.
B. A corporate spy breaks into a competing company’s office and steals sensitive information while employees are attending an off-site event.
C. A corporate spy installs software on the computer of an employee from a competing company to monitor that employee’s communications.
D. A corporate spy poses as a customer of a competing company to elicit information from the competitor’s salespeople.

A

D. A corporate spy poses as a customer of a competing company to elicit information from the competitor’s salespeople.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shareholders’ reports, company newsletters, and staff biographies on the company website might give a competitor valuable information about a company’s product secrets.

A. True
B. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following BEST illustrates the use of technical surveillance for purposes of corporate espionage?

A. A spy creates a deceptive website to trick employees into entering confidential information.
B. A spy hacks into a target computer and monitors an employee’s communications.
C. A spy impersonates a help desk representative to obtain an employee’s network password.
D. A spy uses a phony employee badge to enter an office and take a sensitive document

A

B. A spy hacks into a target computer and monitors an employee’s communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One method that competitive intelligence professionals commonly use to gather data about a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is BEST described as conducting surveillance.

A. True
B. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following terms describes the use of illegal, covert means to acquire information for commercial purposes?

A. Corporate espionage
B. Competitive intelligence
C. Traditional espionage
D. Technical surveillance

A

A. Corporate espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Visitors to a company’s facilities should be allowed unrestricted access as long as they have signed in as a visitor in the company’s logbook and have been issued a visitor’s badge.

A. True
B. False

A

False

17
Q

Competitive intelligence is a legitimate business function that involves assembling competitor data into relevant, accurate, and usable knowledge about competitors’ positions, performance, capabilities, and intentions.

A. True
B. False

A

True

18
Q

Both corporate espionage and competitive intelligence are legitimate forms of information gathering that businesses engage in to anticipate competitors’ research and development (R&D) strategies.

A. True
B. False

A

False

19
Q

Shredding sensitive documents using a cross-cut shredder, sending and receiving mail at a secure site such as a post office box, and employing a perimeter security system at the office are all measures aimed to do which of the following?

A. Catch a fraudster in the act.
B. Protect digital documentation.
C. Prevent misappropriation of office supplies.
D. Guard manual file systems.

A

D. Guard manual file systems.

20
Q

Calendars and schedules displayed at an employee’s workstation can inadvertently provide a company’s competitors with valuable proprietary information.

A. True
B. False

A

True

21
Q

To help safeguard an organization’s proprietary information, management should require all employees throughout the organization to sign noncompetition agreements.

A. True
B. False

A

False

22
Q

Research and development (R&D) personnel often inadvertently divulge confidential information through which of the following?

A. Hiring outside academic professionals
B. Discussions with colleagues at conferences
C. Articles written for industry journals
D. All of the above

A

D. All of the above

23
Q

When a fraudster calls someone at the target company and persuades or tricks the person into providing valuable information, that corporate espionage technique is referred to as which of the following?

A. Spamming
B. Replicating
C. Social engineering
D. None of the above

A

C. Social engineering

24
Q

For corporate espionage purposes, technical surveillance generally consists of gathering documentary evidence or information that can be found via open sources.

A. True
B. False

A

False

25
Q

Favorite targets for intelligence-gathering purposes include employees in all of the following departments EXCEPT:

A. Research and development
B. Shipping and receiving
C. Purchasing
D. Marketing

A

B. Shipping and receiving

26
Q

When developing a program for safeguarding proprietary information (SPI), an organization should form a company task force to develop the program, and the task force should include representatives from relevant departments across the company, such as research and development (R&D), corporate security, and records management.

A. True
B. False

A

True