Rmapa Set 3- Document/Sensitive Information Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rssmc
R
Rssmc
Community Contributor
Quizzes Created: 5 | Total Attempts: 835
| Attempts: 146 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third?

Explanation

The third method of information loss is theft by an insider. This refers to situations where someone within an organization intentionally steals or leaks sensitive information. Unlike inadvertent disclosure, which is accidental, or industrial espionage, which involves external parties, theft by an insider involves a breach of trust from someone within the organization itself. This can have significant consequences as insiders have access to confidential information and can exploit it for personal gain or to harm the organization.

Submit
Please wait...
About This Quiz
Rmapa Set 3- Document/Sensitive Information Security - Quiz


Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly.

2. The term" eavesdropping" refers to:

Explanation

The term "eavesdropping" refers to both wiretapping and "bugging". Wiretapping involves intercepting and listening to telephone or electronic communications without the knowledge or consent of the parties involved. "Bugging" refers to the act of covertly placing a device, such as a microphone or camera, to secretly listen to or record conversations. Both wiretapping and "bugging" involve unauthorized surveillance and invasion of privacy.

Submit
3. Probably the chief reason for the loss of information about sensitive operations is:

Explanation

Inadvertent disclosure refers to the accidental or unintentional release of sensitive information. This can occur through various means such as human error, misconfiguration of systems, or inadequate security measures. Unlike deliberate theft by outsiders or insiders, inadvertent disclosure happens without any malicious intent. It often results from negligence, lack of awareness, or simple mistakes. This type of loss of information is common and can have serious consequences, as it exposes sensitive operations to unauthorized individuals or entities.

Submit
4. The unauthorized acquisition of sensitive information is known as:

Explanation

Industrial espionage refers to the unauthorized acquisition of sensitive information from a company or organization. It involves the theft or unauthorized access of trade secrets, intellectual property, or confidential information for competitive advantage. This can be done through various means, such as hacking, infiltration, or bribery. Unlike embezzlement, larceny, or false pretenses, which involve theft or fraud for personal gain, industrial espionage specifically targets sensitive information for commercial or economic purposes.

Submit
5. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don’t discuss sensitive information" and the other is:

Explanation

Using encryption equipment is a reliable method of protection against telephone line eavesdropping because it ensures that any sensitive information transmitted over the phone is encoded and can only be decoded by authorized parties. This prevents unauthorized individuals from intercepting and understanding the content of the conversation. Encryption adds a layer of security to the communication, making it extremely difficult for eavesdroppers to decipher the information even if they manage to intercept the transmission.

Submit
6. The class of person under a duty to safeguard a proprietary secret is known as:

Explanation

Fiduciaries are individuals who are entrusted with the responsibility of safeguarding and protecting the interests of another person or entity. They have a legal and ethical duty to act in the best interests of the party they represent. In the context of proprietary secrets, fiduciaries would be the class of persons who have a duty to protect and keep confidential any proprietary secrets they have access to. This includes employees, trustees, or anyone else who has been entrusted with such information.

Submit
7. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as:

Explanation

A clandestine listening device that consists of a small hidden microphone and radio transmitter is commonly referred to as a "bug." This device is used for covertly intercepting and transmitting audio signals without the knowledge or consent of the individuals being monitored. It is an illegal and unethical practice that violates privacy rights.

Submit
8. The primary tool of pre-employment screening is the:

Explanation

The application form is the primary tool of pre-employment screening because it allows employers to gather important information about the applicant's qualifications, work history, and personal background. It provides a standardized format for collecting consistent information from all applicants, making it easier for employers to compare and evaluate candidates. The application form also helps employers comply with legal requirements and avoid potential discrimination by asking only job-related questions. Overall, the application form is an essential tool for employers to assess the suitability of candidates for a particular job position.

Submit
9. In designing a proprietary information protection program, the area of greatest vulnerability is:

Explanation

In designing a proprietary information protection program, the area of greatest vulnerability is employees. This is because employees have access to sensitive information and can potentially misuse or leak it. They may intentionally or unintentionally share confidential data with unauthorized individuals, leading to breaches in security. Therefore, it is crucial to implement strict policies, training, and monitoring measures to mitigate the risk posed by employees and ensure the protection of proprietary information.

Submit
10. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation:

Explanation

A contact microphone is the correct answer because it can be attached directly to a surface, such as a wall, to pick up vibrations and sound waves. This makes it ideal for situations where it is difficult or impossible to enter the area and install a traditional microphone. The contact microphone is able to capture sound by directly sensing the vibrations of the surface it is attached to, allowing for effective audio recording in these challenging scenarios.

Submit
11. The instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:

Explanation

A pen register is an instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone. It is different from a wiretap or bug, which involve intercepting and recording conversations. A pen register simply records the numbers dialed, providing a log of outgoing calls made from a specific phone. It is commonly used by law enforcement agencies with proper legal authorization to gather evidence or track phone activity during investigations.

Submit
12. A trade secret is:

Explanation

A trade secret refers to any formula, pattern, device, or compilation of information that is utilized in a business and provides that business with a competitive advantage over rivals who are unaware of or do not employ it. This definition highlights the essence of a trade secret, which is the confidential and valuable information that a company keeps secret to maintain its competitive edge in the market.

Submit
13. Any formula pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:

Explanation

A trade secret refers to any formula pattern, device, or compilation of information that is used in one's business and provides them with a competitive advantage over competitors who are unaware of or do not use it. Unlike a patent, which grants exclusive rights to an invention for a limited period of time, a trade secret is not publicly disclosed and remains confidential. It allows the owner to maintain a monopoly over the information and prevents others from replicating or benefiting from it without authorization.

Submit
14. The control software of a Private Board Exchange (PBX) can be accessed and comprise by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:

Explanation

The correct answer is Remote Maintenance Access Terminal. The explanation for this is that the Remote Maintenance Access Terminal is a device on a PBX that allows access to the control software. It can be accessed by calling its telephone number from a computer and modem. This device is specifically designed for remote maintenance and management of the PBX system.

Submit
15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

Explanation

In this situation, if there is no evidence to prove that the owner of the trade secret took reasonable precautions to protect the confidential information, it may be decided that the disclosure of the trade secret by another party was innocent rather than wrongful. This means that even if the person making the disclosure had malice or wrong intent, they may not be held liable if the owner did not take adequate measures to safeguard the confidential information.

Submit
16. A specially- constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

Explanation

A contact microphone is a specially-constructed microphone that is attached directly to an object or surface to be protected. It is designed to respond only when the protected object or surface is disturbed. This type of microphone is commonly used in applications such as recording acoustic instruments, capturing sound vibrations in machinery, or detecting unauthorized tampering or movement of objects. By directly contacting the object or surface, the contact microphone can pick up even the slightest vibrations or disturbances, making it an ideal choice for specific surveillance or monitoring purposes.

Submit
17. Probably the main reason for loss of sensitive information is:

Explanation

Inadvertent disclosure refers to the unintentional release or sharing of sensitive information. This can happen due to human error, such as sending an email to the wrong recipient or leaving a document unattended. It is a common reason for the loss of sensitive information as it does not involve any deliberate or malicious intent.

Submit
18. "Social engineering" is:

Explanation

"Social engineering" refers to the act of manipulating or deceiving individuals to gain unauthorized access to sensitive information or systems. It involves using psychological tactics to trick people into revealing confidential information without them realizing the true intention behind the interaction. This can be done through various means such as phone calls, emails, or in-person interactions. The correct answer states that social engineering is the subtle elicitation of information without revealing the true purpose of the call, which accurately describes the concept.

Submit
19. Which of the following is generally not true with regard to proprietary information?

Explanation

not-available-via-ai

Submit
20. A microphone with a large disk like attachment used for listening to audio from great distances is known as:

Explanation

A parabolic microphone is a type of microphone that uses a large dish-shaped attachment to capture audio from great distances. The dish acts as a parabolic reflector, focusing sound waves onto a small microphone element at the focal point. This design allows the microphone to pick up distant sounds with high precision and sensitivity. The other options, such as contact microphone, spike microphone, and moving coil microphone, do not specifically refer to a microphone with a large disk-like attachment for long-distance listening.

Submit
21. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?

Explanation

The other employees leaving the company and attempting to use trade secret information in the business of a new employer is a serious factor to be considered. This situation can lead to further loss of trade secrets and potential harm to the company.

Submit
22. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:

Explanation

A dynamic microphone is the correct answer because it does not require a power source to operate, is small in size, and can be discreetly hidden in items like cuff links and hearing aids. This type of microphone uses a diaphragm and coil to convert sound waves into electrical signals, making it a versatile and portable option for various audio recording applications.

Submit
23. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?

Explanation

Tempest shielding is used to protect very sensitive equipment from electromagnetic radiation. Tempest shielding refers to the measures taken to prevent the emission of electromagnetic signals from electronic devices that could be intercepted and used for unauthorized purposes. It involves the use of specialized materials and techniques to minimize electromagnetic emissions and ensure the security of sensitive information.

Submit
24. Sound waves too high in frequency to be heard by the human ear, generally above 20KHZ are known as:

Explanation

Ultrasonic waves are sound waves that have a frequency higher than the upper limit of human hearing, which is typically around 20,000 Hz. These waves are used in various applications such as medical imaging, cleaning, and measuring distances. Microwaves, on the other hand, are electromagnetic waves with longer wavelengths and lower frequencies that are commonly used in cooking. High frequency and short wave are more general terms that do not specifically refer to sound waves.

Submit
25. Proprietary information is:

Explanation

Proprietary information refers to any information that an enterprise deems relevant to its status or operations and wishes to keep confidential, without disclosing it publicly. This can include trade secrets, intellectual property, customer data, financial information, and any other sensitive information that could give the enterprise a competitive advantage or harm its business if it falls into the wrong hands. It is important for companies to protect their proprietary information to maintain their competitive edge and safeguard their operations.

Submit
26. Which of the following statements is incorrect with regard to an information security program?

Explanation

A good information security program aims to make theft of sensitive information difficult, but it cannot provide absolute protection against an enemy spy. No security program can guarantee complete protection against determined adversaries. It is important to establish and maintain trust relationships with employees and rely on their good will and compliance for the success of the program.

Submit
27. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:

Explanation

Competitive intelligence gathering is an activity that helps firms stay informed about market changes and trends. By alerting senior management to marketplace changes, they can proactively respond and adapt their strategies to prevent any surprises or disruptions. This allows the company to stay competitive and make informed decisions based on the current market conditions. It is not related to personal habits of competitive senior management, government intelligence agencies, or changes in protocol in foreign countries.

Submit
28. Which of the following is not true with regard to electronic eavesdropping?

Explanation

Electronic eavesdropping devices are designed to be covert and undetectable. Therefore, a listening device installed in a wire would not cause any noticeable noise or interference on the line. This is why the statement is not true.

Submit
29. Vital records normally constitute the following percentage of the company’s total records:

Explanation

Vital records typically make up a small percentage of a company's total records. The correct answer is 2%, indicating that vital records only constitute a minor portion of the company's overall records. This suggests that most of the company's records are not considered vital, meaning they are not crucial or essential for the company's operations or legal requirements.

Submit
30. Which of the following is not a correct statement, or a general rule involving the protection of proprietary information?

Explanation

The correct answer is "Any agreements to be bound must always be in writing and are not implied from acts." This statement is not a correct statement or a general rule involving the protection of proprietary information. In some cases, agreements to be bound can be implied from acts, and they do not always have to be in writing.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 13, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 13, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 27, 2010
    Quiz Created by
    Rssmc
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Two of the three most common methods of information losses are...
The term" eavesdropping" refers to:
Probably the chief reason for the loss of information about sensitive...
The unauthorized acquisition of sensitive information is known as:
Two methods of protection against telephone line eavesdropping are...
The class of person under a duty to safeguard a proprietary secret is...
A clandestine listening device, generally a small hidden microphone...
The primary tool of pre-employment screening is the:
In designing a proprietary information protection program, the area of...
A microphone which is normally installed on a common wall...
The instrument used to monitor telephone calls by providing a record...
A trade secret is:
Any formula pattern, device or compilation of information which is...
The control software of a Private Board Exchange (PBX) can be accessed...
With respect to trade secrets, it may be decided that its disclosure...
A specially- constructed microphone attached directly to an object or...
Probably the main reason for loss of sensitive information is:
"Social engineering" is:
Which of the following is generally not true with regard to...
A microphone with a large disk like attachment used for listening to...
A former employee, who had access to your trade secret information, is...
A microphone which has the characteristics of requiring no power...
Electromagnetic radiation is detectable electromagnetic energy is...
Sound waves too high in frequency to be heard by the human ear,...
Proprietary information is:
Which of the following statements is incorrect with regard to an...
Competitive intelligence gathering is a legitimate activity which is...
Which of the following is not true with regard to electronic...
Vital records normally constitute the following percentage of the...
Which of the following is not a correct statement, or a general rule...
Alert!

Advertisement