Rmapa Set 3- Document/Sensitive Information Security

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rssmc
R
Rssmc
Community Contributor
Quizzes Created: 5 | Total Attempts: 805
Questions: 30 | Attempts: 145

SettingsSettingsSettings
Rmapa Set 3- Document/Sensitive Information Security - Quiz


Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly.


Questions and Answers
  • 1. 

    Any formula pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:

    • A.

      A monopoly

    • B.

      An unfair trade practice

    • C.

      A trade secret

    • D.

      A patent

    Correct Answer
    C. A trade secret
    Explanation
    A trade secret refers to any formula pattern, device, or compilation of information that is used in one's business and provides them with a competitive advantage over competitors who are unaware of or do not use it. Unlike a patent, which grants exclusive rights to an invention for a limited period of time, a trade secret is not publicly disclosed and remains confidential. It allows the owner to maintain a monopoly over the information and prevents others from replicating or benefiting from it without authorization.

    Rate this question:

  • 2. 

    Probably the main reason for loss of sensitive information is:

    • A.

      In advertent disclosure

    • B.

      Deliberately stolen by outsider

    • C.

      Industrial espionage

    • D.

      Deliberately stolen by insider

    Correct Answer
    A. In advertent disclosure
    Explanation
    Inadvertent disclosure refers to the unintentional release or sharing of sensitive information. This can happen due to human error, such as sending an email to the wrong recipient or leaving a document unattended. It is a common reason for the loss of sensitive information as it does not involve any deliberate or malicious intent.

    Rate this question:

  • 3. 

    The primary tool of pre-employment screening is the:

    • A.

      Interview

    • B.

      Application form

    • C.

      The investigation

    • D.

      The investigator

    Correct Answer
    B. Application form
    Explanation
    The application form is the primary tool of pre-employment screening because it allows employers to gather important information about the applicant's qualifications, work history, and personal background. It provides a standardized format for collecting consistent information from all applicants, making it easier for employers to compare and evaluate candidates. The application form also helps employers comply with legal requirements and avoid potential discrimination by asking only job-related questions. Overall, the application form is an essential tool for employers to assess the suitability of candidates for a particular job position.

    Rate this question:

  • 4. 

    Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:

    • A.

      Alert senior management to market place changes in order to prevent surprise

    • B.

      Alert senior management as to the personal habits of competitive senior management

    • C.

      Alert government intelligence agencies to marketplace changes

    • D.

      Alert senior management to changes in protocol in foreign countries

    Correct Answer
    A. Alert senior management to market place changes in order to prevent surprise
    Explanation
    Competitive intelligence gathering is an activity that helps firms stay informed about market changes and trends. By alerting senior management to marketplace changes, they can proactively respond and adapt their strategies to prevent any surprises or disruptions. This allows the company to stay competitive and make informed decisions based on the current market conditions. It is not related to personal habits of competitive senior management, government intelligence agencies, or changes in protocol in foreign countries.

    Rate this question:

  • 5. 

    The instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:

    • A.

      A wiretap

    • B.

      A bug

    • C.

      An electronic surveillance

    • D.

      A pen register

    Correct Answer
    D. A pen register
    Explanation
    A pen register is an instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone. It is different from a wiretap or bug, which involve intercepting and recording conversations. A pen register simply records the numbers dialed, providing a log of outgoing calls made from a specific phone. It is commonly used by law enforcement agencies with proper legal authorization to gather evidence or track phone activity during investigations.

    Rate this question:

  • 6. 

    A clandestine listening device, generally a small hidden microphone and radio transmitter is known as:

    • A.

      A wiretap

    • B.

      A bug

    • C.

      A tempest

    • D.

      A beeper

    Correct Answer
    B. A bug
    Explanation
    A clandestine listening device that consists of a small hidden microphone and radio transmitter is commonly referred to as a "bug." This device is used for covertly intercepting and transmitting audio signals without the knowledge or consent of the individuals being monitored. It is an illegal and unethical practice that violates privacy rights.

    Rate this question:

  • 7. 

    A microphone with a large disk like attachment used for listening to audio from great distances is known as:

    • A.

      Contact microphone

    • B.

      Spike microphone

    • C.

      Parabolic microphone

    • D.

      Moving coil microphone

    Correct Answer
    C. Parabolic micropHone
    Explanation
    A parabolic microphone is a type of microphone that uses a large dish-shaped attachment to capture audio from great distances. The dish acts as a parabolic reflector, focusing sound waves onto a small microphone element at the focal point. This design allows the microphone to pick up distant sounds with high precision and sensitivity. The other options, such as contact microphone, spike microphone, and moving coil microphone, do not specifically refer to a microphone with a large disk-like attachment for long-distance listening.

    Rate this question:

  • 8. 

    Sound waves too high in frequency to be heard by the human ear, generally above 20KHZ are known as:

    • A.

      Microwaves

    • B.

      Ultrasonic

    • C.

      High frequency

    • D.

      Short wave

    Correct Answer
    B. Ultrasonic
    Explanation
    Ultrasonic waves are sound waves that have a frequency higher than the upper limit of human hearing, which is typically around 20,000 Hz. These waves are used in various applications such as medical imaging, cleaning, and measuring distances. Microwaves, on the other hand, are electromagnetic waves with longer wavelengths and lower frequencies that are commonly used in cooking. High frequency and short wave are more general terms that do not specifically refer to sound waves.

    Rate this question:

  • 9. 

    Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don’t discuss sensitive information" and the other is:

    • A.

      To use wire tap detector

    • B.

      To use radio jammer

    • C.

      To use audio jammer

    • D.

      To use encryption equipment

    Correct Answer
    D. To use encryption equipment
    Explanation
    Using encryption equipment is a reliable method of protection against telephone line eavesdropping because it ensures that any sensitive information transmitted over the phone is encoded and can only be decoded by authorized parties. This prevents unauthorized individuals from intercepting and understanding the content of the conversation. Encryption adds a layer of security to the communication, making it extremely difficult for eavesdroppers to decipher the information even if they manage to intercept the transmission.

    Rate this question:

  • 10. 

    The unauthorized acquisition of sensitive information is known as:

    • A.

      Industrial espionage

    • B.

      Embezzlement

    • C.

      Larceny

    • D.

      False pretenses

    Correct Answer
    A. Industrial espionage
    Explanation
    Industrial espionage refers to the unauthorized acquisition of sensitive information from a company or organization. It involves the theft or unauthorized access of trade secrets, intellectual property, or confidential information for competitive advantage. This can be done through various means, such as hacking, infiltration, or bribery. Unlike embezzlement, larceny, or false pretenses, which involve theft or fraud for personal gain, industrial espionage specifically targets sensitive information for commercial or economic purposes.

    Rate this question:

  • 11. 

    Proprietary information is:

    • A.

      Information which must be so classified under government order

    • B.

      Private information of highly sensitive character

    • C.

      Defense data which must be classified according to federal regulations

    • D.

      Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

    Correct Answer
    D. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly
    Explanation
    Proprietary information refers to any information that an enterprise deems relevant to its status or operations and wishes to keep confidential, without disclosing it publicly. This can include trade secrets, intellectual property, customer data, financial information, and any other sensitive information that could give the enterprise a competitive advantage or harm its business if it falls into the wrong hands. It is important for companies to protect their proprietary information to maintain their competitive edge and safeguard their operations.

    Rate this question:

  • 12. 

    A trade secret is:

    • A.

      Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it

    • B.

      All information about a company which the company desires to protect

    • C.

      Information of a company which is registered as such with the U.S Patent office

    • D.

      Information so designated by the government

    Correct Answer
    A. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to gain an advantage over competitors who do not know or use it
    Explanation
    A trade secret refers to any formula, pattern, device, or compilation of information that is utilized in a business and provides that business with a competitive advantage over rivals who are unaware of or do not employ it. This definition highlights the essence of a trade secret, which is the confidential and valuable information that a company keeps secret to maintain its competitive edge in the market.

    Rate this question:

  • 13. 

    The control software of a Private Board Exchange (PBX) can be accessed and comprise by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:

    • A.

      Time Domain Reflectometer

    • B.

      Remote Maintenance Access Terminal

    • C.

      Current Carrier Signaling Port

    • D.

      Internal and Remote Signal Port

    Correct Answer
    B. Remote Maintenance Access Terminal
    Explanation
    The correct answer is Remote Maintenance Access Terminal. The explanation for this is that the Remote Maintenance Access Terminal is a device on a PBX that allows access to the control software. It can be accessed by calling its telephone number from a computer and modem. This device is specifically designed for remote maintenance and management of the PBX system.

    Rate this question:

  • 14. 

    Which of the following is generally not true with regard to proprietary information?

    • A.

      Secret information does not have to be specifically identifiable

    • B.

      Secret information must be such that it can be effectively protected

    • C.

      The more narrowly a business defines what it regards as secret, the easier it is to protect that body of information

    • D.

      It is difficult to protect as a trade secret that which can be found in publicly- accessible sources

    Correct Answer
    A. Secret information does not have to be specifically identifiable
  • 15. 

    With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

    • A.

      There is absence of evidence that an owner has taken reasonable precautions to protect confidential information

    • B.

      The trade secret was not registered

    • C.

      The trade secret did not involve national defense information

    • D.

      The trade secret was not in a current use

    Correct Answer
    A. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information
    Explanation
    In this situation, if there is no evidence to prove that the owner of the trade secret took reasonable precautions to protect the confidential information, it may be decided that the disclosure of the trade secret by another party was innocent rather than wrongful. This means that even if the person making the disclosure had malice or wrong intent, they may not be held liable if the owner did not take adequate measures to safeguard the confidential information.

    Rate this question:

  • 16. 

    The class of person under a duty to safeguard a proprietary secret is known as:

    • A.

      Agents

    • B.

      Agents

    • C.

      Fiduciaries

    • D.

      Business Associates

    Correct Answer
    C. Fiduciaries
    Explanation
    Fiduciaries are individuals who are entrusted with the responsibility of safeguarding and protecting the interests of another person or entity. They have a legal and ethical duty to act in the best interests of the party they represent. In the context of proprietary secrets, fiduciaries would be the class of persons who have a duty to protect and keep confidential any proprietary secrets they have access to. This includes employees, trustees, or anyone else who has been entrusted with such information.

    Rate this question:

  • 17. 

    Which of the following is not a correct statement, or a general rule involving the protection of proprietary information?

    • A.

      By operation of common law employees are presumed to be fiduciaries to extent they may not disclose secrets of their employers without authorization

    • B.

      As a class, employees are the largest group of persons bound to secrecy because of their status or relationship

    • C.

      Other than employees, any other persons to be bound to secrecy must agree to be so bound

    • D.

      Any agreements to be bound must always be in writing and are not implied from acts

    Correct Answer
    D. Any agreements to be bound must always be in writing and are not implied from acts
    Explanation
    The correct answer is "Any agreements to be bound must always be in writing and are not implied from acts." This statement is not a correct statement or a general rule involving the protection of proprietary information. In some cases, agreements to be bound can be implied from acts, and they do not always have to be in writing.

    Rate this question:

  • 18. 

    Probably the chief reason for the loss of information about sensitive operations is:

    • A.

      Deliberately stolen by outsider

    • B.

      Loss by fire or other disaster

    • C.

      Deliberately stolen by insider

    • D.

      Lost through inadvertent disclosure

    Correct Answer
    D. Lost through inadvertent disclosure
    Explanation
    Inadvertent disclosure refers to the accidental or unintentional release of sensitive information. This can occur through various means such as human error, misconfiguration of systems, or inadequate security measures. Unlike deliberate theft by outsiders or insiders, inadvertent disclosure happens without any malicious intent. It often results from negligence, lack of awareness, or simple mistakes. This type of loss of information is common and can have serious consequences, as it exposes sensitive operations to unauthorized individuals or entities.

    Rate this question:

  • 19. 

    The term" eavesdropping" refers to:

    • A.

      Wire tapping only

    • B.

      “Bugging” only

    • C.

      Both wiretapping and "bugging"

    • D.

      Mail covers

    Correct Answer
    C. Both wiretapping and "bugging"
    Explanation
    The term "eavesdropping" refers to both wiretapping and "bugging". Wiretapping involves intercepting and listening to telephone or electronic communications without the knowledge or consent of the parties involved. "Bugging" refers to the act of covertly placing a device, such as a microphone or camera, to secretly listen to or record conversations. Both wiretapping and "bugging" involve unauthorized surveillance and invasion of privacy.

    Rate this question:

  • 20. 

    A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:

    • A.

      Carbon microphone

    • B.

      Dynamic microphone

    • C.

      Contact microphone

    • D.

      Parabolic microphone

    Correct Answer
    B. Dynamic micropHone
    Explanation
    A dynamic microphone is the correct answer because it does not require a power source to operate, is small in size, and can be discreetly hidden in items like cuff links and hearing aids. This type of microphone uses a diaphragm and coil to convert sound waves into electrical signals, making it a versatile and portable option for various audio recording applications.

    Rate this question:

  • 21. 

    A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation:

    • A.

      Carbon microphone

    • B.

      Dynamic microphone

    • C.

      Contact microphone

    • D.

      Parabolic microphone

    Correct Answer
    C. Contact micropHone
    Explanation
    A contact microphone is the correct answer because it can be attached directly to a surface, such as a wall, to pick up vibrations and sound waves. This makes it ideal for situations where it is difficult or impossible to enter the area and install a traditional microphone. The contact microphone is able to capture sound by directly sensing the vibrations of the surface it is attached to, allowing for effective audio recording in these challenging scenarios.

    Rate this question:

  • 22. 

    Which of the following is not true with regard to electronic eavesdropping?

    • A.

      A listening device installed in a wire will cause a cracking sound, click or other noise that can be heard on the line

    • B.

      An effective countermeasures survey to detect evidences of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment

    • C.

      All wiring should be traced out and accounted for in countermeasures survey

    • D.

      In a countermeasures survey to detect electronic eavesdropping, a physical search should be utilized as well as an electronic search

    Correct Answer
    A. A listening device installed in a wire will cause a cracking sound, click or other noise that can be heard on the line
    Explanation
    Electronic eavesdropping devices are designed to be covert and undetectable. Therefore, a listening device installed in a wire would not cause any noticeable noise or interference on the line. This is why the statement is not true.

    Rate this question:

  • 23. 

    In designing a proprietary information protection program, the area of greatest vulnerability is:

    • A.

      Personnel files

    • B.

      Marketing data

    • C.

      Employees

    • D.

      Computers

    Correct Answer
    C. Employees
    Explanation
    In designing a proprietary information protection program, the area of greatest vulnerability is employees. This is because employees have access to sensitive information and can potentially misuse or leak it. They may intentionally or unintentionally share confidential data with unauthorized individuals, leading to breaches in security. Therefore, it is crucial to implement strict policies, training, and monitoring measures to mitigate the risk posed by employees and ensure the protection of proprietary information.

    Rate this question:

  • 24. 

    Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third?

    • A.

      A newspaper articles

    • B.

      Television

    • C.

      Magazine articles

    • D.

      Theft by an insider

    Correct Answer
    D. Theft by an insider
    Explanation
    The third method of information loss is theft by an insider. This refers to situations where someone within an organization intentionally steals or leaks sensitive information. Unlike inadvertent disclosure, which is accidental, or industrial espionage, which involves external parties, theft by an insider involves a breach of trust from someone within the organization itself. This can have significant consequences as insiders have access to confidential information and can exploit it for personal gain or to harm the organization.

    Rate this question:

  • 25. 

    Which of the following statements is incorrect with regard to an information security program?

    • A.

      A good information security program will provide absolute protection against an enemy spy

    • B.

      The information security program is an attempt to make theft of sensitive information difficult, not necessarily eliminate it

    • C.

      A trust relationship must be established and maintained with employees

    • D.

      The good will and compliance of employees is crucial for success

    Correct Answer
    A. A good information security program will provide absolute protection against an enemy spy
    Explanation
    A good information security program aims to make theft of sensitive information difficult, but it cannot provide absolute protection against an enemy spy. No security program can guarantee complete protection against determined adversaries. It is important to establish and maintain trust relationships with employees and rely on their good will and compliance for the success of the program.

    Rate this question:

  • 26. 

    Vital records normally constitute the following percentage of the company’s total records:

    • A.

      2%

    • B.

      5%

    • C.

      10%

    • D.

      15%

    Correct Answer
    A. 2%
    Explanation
    Vital records typically make up a small percentage of a company's total records. The correct answer is 2%, indicating that vital records only constitute a minor portion of the company's overall records. This suggests that most of the company's records are not considered vital, meaning they are not crucial or essential for the company's operations or legal requirements.

    Rate this question:

  • 27. 

    A specially- constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

    • A.

      Parabolic microphone

    • B.

      Special audio device

    • C.

      Contact microphone

    • D.

      Surreptitious microphone

    Correct Answer
    C. Contact micropHone
    Explanation
    A contact microphone is a specially-constructed microphone that is attached directly to an object or surface to be protected. It is designed to respond only when the protected object or surface is disturbed. This type of microphone is commonly used in applications such as recording acoustic instruments, capturing sound vibrations in machinery, or detecting unauthorized tampering or movement of objects. By directly contacting the object or surface, the contact microphone can pick up even the slightest vibrations or disturbances, making it an ideal choice for specific surveillance or monitoring purposes.

    Rate this question:

  • 28. 

    "Social engineering" is:

    • A.

      The conversation involved in the beginning of a romantic relationship

    • B.

      A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity

    • C.

      The subtle elicitation of information without revealing the true purpose of the call

    • D.

      The specific design of a business structure to facilitate the interaction of the inhabitants

    Correct Answer
    C. The subtle elicitation of information without revealing the true purpose of the call
    Explanation
    "Social engineering" refers to the act of manipulating or deceiving individuals to gain unauthorized access to sensitive information or systems. It involves using psychological tactics to trick people into revealing confidential information without them realizing the true intention behind the interaction. This can be done through various means such as phone calls, emails, or in-person interactions. The correct answer states that social engineering is the subtle elicitation of information without revealing the true purpose of the call, which accurately describes the concept.

    Rate this question:

  • 29. 

    A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?

    • A.

      You may have to expose the very secrets you are attempting to protect

    • B.

      The cost of the litigation may exceed the value of the secret information

    • C.

      You may lose a law case

    • D.

      Other employees may leave the company and attempt to use trade secret information in the business of a new employer

    Correct Answer
    D. Other employees may leave the company and attempt to use trade secret information in the business of a new employer
    Explanation
    The other employees leaving the company and attempting to use trade secret information in the business of a new employer is a serious factor to be considered. This situation can lead to further loss of trade secrets and potential harm to the company.

    Rate this question:

  • 30. 

    Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?

    • A.

      A current carrier device

    • B.

      Pneumatic cavity shielding

    • C.

      Tempest shielding

    • D.

      Pen register shielding

    Correct Answer
    C. Tempest shielding
    Explanation
    Tempest shielding is used to protect very sensitive equipment from electromagnetic radiation. Tempest shielding refers to the measures taken to prevent the emission of electromagnetic signals from electronic devices that could be intercepted and used for unauthorized purposes. It involves the use of specialized materials and techniques to minimize electromagnetic emissions and ensure the security of sensitive information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 13, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 27, 2010
    Quiz Created by
    Rssmc
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.