Information Security

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Piracy refers to the illegal duplication and distribution of recordings. Which form is not considered piracy?
2.
1 point
To prevent cybercrime, it is not a good strategy to:
3.
1 point
The class of a person under a duty to safeguard a proprietary secret is known as?
4.
1 point
The major reason for loss of sensitive information is?
5.
1 point
A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is NOT a serious matter to be considered?
6.
1 point
A microphone with large disk-like attachment used for listening to audio from great distances is known as:
7.
1 point
Proprietary information is:
8.
1 point
Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence to:
9.
1 point
All proprietary information is sensitive while not all sensitive information is proprietary. An example of information which is not proprietary even though the organization would treat it as sensitive is:
10.
1 point
Sound waves too high in frequency to be heard by the human ear, generally above 20KHZ are known as:
11.
1 point
Which of the following is NOT true with regard to electronic eavesdropping?
12.
1 point
Trade secrets are generally afforded greater legal protection than other proprietary information. Which of the following is not an element of the test for a trade secret?
13.
1 point
The class of a person under a duty to safeguard a proprietary secret is known as?
14.
1 point
A specially-constructed microphone attached directly to an object or surface to be protected and which responds only when the projected object or surface is disturbed is known as:
15.
1 point
A nonlinear junction is used to locate eavesdropping devices by:
16.
1 point
The unauthorized acquisition of sensitive information is known as?
17.
1 point
Which federal stature does not protect information and communication systems?
18.
1 point
"Social engineering" is:
19.
1 point
Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don't discuss sensitive information" and the other is:
20.
1 point
In designing a proprietary information program, the area of greatest vulnerability is: