Rmapa Set 3- Document/Sensitive Information Security

10 Questions | Total Attempts: 111

Settings
Please wait...
Rmapa Quizzes & Trivia

Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly.


Questions and Answers
  • 1. 
    Any formula pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:
    • A. 

      A monopoly

    • B. 

      An unfair trade practice

    • C. 

      A trade secret

    • D. 

      A patent

  • 2. 
    Probably the main reason for loss of sensitive information is:
    • A. 

      In advertent disclosure

    • B. 

      Deliberately stolen by outsider

    • C. 

      Industrial espionage

    • D. 

      Deliberately stolen by insider

  • 3. 
    The primary tool of pre-employment screening is the:
    • A. 

      Interview

    • B. 

      Application form

    • C. 

      The investigation

    • D. 

      The investigator

  • 4. 
    Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:
    • A. 

      Alert senior management to market place changes in order to prevent surprise

    • B. 

      Alert senior management as to the personal habits of competitive senior management

    • C. 

      Alert government intelligence agencies to marketplace changes

    • D. 

      Alert senior management to changes in protocol in foreign countries

  • 5. 
    The instrument used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:
    • A. 

      A wiretap

    • B. 

      A bug

    • C. 

      An electronic surveillance

    • D. 

      A pen register

  • 6. 
    A clandestine listening device, generally a small hidden microphone and radio transmitter is known as:
    • A. 

      A wiretap

    • B. 

      A bug

    • C. 

      A tempest

    • D. 

      A beeper

  • 7. 
    A microphone with a large disk like attachment used for listening to audio from great distances is known as:
    • A. 

      Contact microphone

    • B. 

      Spike microphone

    • C. 

      Parabolic microphone

    • D. 

      Moving coil microphone

  • 8. 
    Sound waves too high in frequency to be heard by the human ear, generally above 20KHZ are known as:
    • A. 

      Microwaves

    • B. 

      Ultrasonic

    • C. 

      High frequency

    • D. 

      Short wave

  • 9. 
    Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is "don’t discuss sensitive information" and the other is:
    • A. 

      To use wire tap detector

    • B. 

      To use radio jammer

    • C. 

      To use audio jammer

    • D. 

      To use encryption equipment

  • 10. 
    The unauthorized acquisition of sensitive information is known as:
    • A. 

      Industrial espionage

    • B. 

      Embezzlement

    • C. 

      Larceny

    • D. 

      False pretenses