Information Security - Sample CPP Exam Questions
Information Security - Sample CPP Exam Questions
a. A monopoly
b. An unfair trade practice
c. A trade secret
d. A patent
1. Any formula, pattern, device or
compilation of information which is
used in one’s business and which
gives him an opportunity to gain an
advantage over competitors who do
not know or use it is:
a. A monopoly
b. An unfair trade practice
c. A trade secret
d. A patent
2. Probably the main reason for loss of
sensitive information is:
a. Inadvertent disclosure
b. Deliberately stolen by outsider
c. Industrial espionage
d. Deliberately stolen by insider
2. Probably the main reason for loss of
sensitive information is:
a. Inadvertent disclosure
b. Deliberately stolen by outsider
c. Industrial espionage
d. Deliberately stolen by insider
3. The primary tool of pre-employment
screening is the:
a. Interview
b. Application form
c. The investigation
d. The investigator
3. The primary tool of pre-employment
screening is the:
a. Interview
b. Application form
c. The investigation
d. The investigator
4. Competitive intelligence gathering is a
legitimate activity which is engaged in by
many firms throughout the world. The most
important function of competitive
intelligence is to:
a. Alert senior management to marketplace
changes in order to prevent surprise
b. Alert senior management as to the personal
habits of competitive senior
management
c. Alert government intelligence agencies to
marketplace changes
d. Alert senior management to changes in
protocol in foreign countries
4. Competitive intelligence gathering is a
legitimate activity which is engaged in by
many firms throughout the world. The most
important function of competitive
intelligence is to:
a. Alert senior management to marketplace
changes in order to prevent surprise
b. Alert senior management as to the personal
habits of competitive senior
management
c. Alert government intelligence agencies to
marketplace changes
d. Alert senior management to changes in
protocol in foreign countries
5. The instrument used to monitor
telephone call by providing a record of
all numbers dialed from a particular
phone is called:
a. A wiretap
b. A bug
c. An electronic surveillance
d. A pen register
5. The instrument used to monitor
telephone call by providing a record of
all numbers dialed from a particular
phone is called:
a. A wiretap
b. A bug
c. An electronic surveillance
d. A pen register
6. A clandestine listening device,
generally a small hidden microphone
and radio transmitter is known as :
a. A bug
b. A wiretap
c. A tempest
d. A beeper
6. A clandestine listening device,
generally a small hidden microphone
and radio transmitter is known as :
a. A bug
b. A wiretap
c. A tempest
d. A beeper
7. A microphone with a large disk-
like attachment used for listening to
audio from great distances is known
as:
a. Contact microphone
b. Spike microphone
c. Parabolic microphone
d. Moving coil microphone
7. A microphone with a large disk-
like attachment used for listening to
audio from great distances is known
as:
a. Contact microphone
b. Spike microphone
c. Parabolic microphone
d. Moving coil microphone
8. Sound waves too high in
frequency to be heard by the human
ear, generally above 20 KHZ are known
as:
a. Microwaves
b. Ultrasonic
c. High frequency
d. Short-wave
8. Sound waves too high in
frequency to be heard by the human
ear, generally above 20 KHZ are known
as:
a. Microwaves
b. Ultrasonic
c. High frequency
d. Short-wave
9. Two methods of protection
against telephone line eavesdropping
are apparently reliable. The first
method is “don’t discuss sensitive
information” and the other is:
a. Industrial espionage
b. Embezzlement
c. Larceny
d. False pretenses
10. The unauthorized acquisition of
sensitive information is known as:
a. Industrial espionage
b. Embezzlement
c. Larceny
d. False pretenses
11. Proprietary information is:
a. Information which must be so classified
under government order
b. Private information of highly sensitive
character
c. Defense data which must be classified
according to federal regulations
d. Anything that an enterprise considers
relevant to its status or operations
and does not want to disclose publicly
11. Proprietary information is:
a. Information which must be so classified
under government order
b. Private information of highly sensitive
character
c. Defense data which must be classified
according to federal regulations
d. Anything that an enterprise
considers relevant to its status or
operations and does not want to disclose
publicly
12. A trade secret is:
a. Agents
b. Principals
c. Fiduciaries
d. Business Associates
16. The class of person under a duty to
safeguard a proprietary secret is known
as:
a. Agents
b. Principals
c. Fiduciaries
d. Business Associates
17. Which of the following is not a correct
statement, or a general rule, involving the
protection of proprietary information?
a. Wiretapping only
b. “Bugging” only
c. Both wiretapping and “bugging”
d. Mail covers
19. The term “eavesdropping” refers to:
a. Wiretapping only
b. “Bugging” only
c. Both wiretapping and “bugging”
d. Mail covers
20. A microphone which has the
characteristics of requiring no power source
to operate it, is quite small, relatively
difficult to detect, and is offered by
equipment suppliers in such items as cuff
links and hearing aides is known as:
a. Carbon microphone
b. Dynamic microphone
c. Contact microphone
d. Parabolic microphone
20. A microphone which has the
characteristics of requiring no power source
to operate it, is quite small, relatively
difficult to detect, and is offered by
equipment suppliers in such items as cuff
links and hearing aides is known as:
a. Carbon microphone
b. Dynamic microphone
c. Contact microphone
d. Parabolic microphone
21. A microphone which is normally
installed on a common wall adjoining a
target area when it is impractical or
impossible to enter the area to make a
microphone installation is:
a. Carbon microphone
b. Dynamic microphone
c. Contact microphone
d. Parabolic microphone
21. A microphone which is normally
installed on a common wall adjoining a
target area when it is impractical or
impossible to enter the area to make a
microphone installation is:
a. Carbon microphone
b. Dynamic microphone
c. Contact microphone
d. Parabolic microphone
22. Which of the following is not true
with regard to electronic
eavesdropping:
a. A listening device installed in a wire will cause a
crackling sound, click or other noise than can be heard on
the line
b. An effective countermeasures survey to detect evidence
of electronic eavesdropping in telephone equipment
must be conducted by a person technically familiar with
such equipment
c. All wiring should be traced out and accounted for in a
countermeasures survey
d. In a countermeasures survey to detect electronic
eavesdropping. A physical search should be utilized
as well as an electronic search
22. Which of the following is not true
with regard to electronic
eavesdropping:
a. A listening device installed in a wire will cause a
crackling sound, click or other noise than can be
heard on the line
b. An effective countermeasures survey to detect evidence
of electronic eavesdropping in telephone equipment
must be conducted by a person technically familiar with
such equipment
c. All wiring should be traced out and accounted for in a
countermeasures survey
d. In a countermeasures survey to detect electronic
eavesdropping. A physical search should be utilized
as well as an electronic search
23. In designing a proprietary
information protection program, the
area of greatest vulnerability is:
a. Personnel files
b. Marketing data
c. Employees
d. Computers
23. In designing a proprietary
information protection program, the
area of greatest vulnerability is:
a. Personnel files
b. Marketing data
c. Employees
d. Computers
24. Two of the three most common
methods of information losses are
inadvertent disclosure and industrial
espionage. Which of the following is the
third:
a. Newspaper articles
b. Television
c. Magazine articles
d. Theft by an insider
24. Two of the three most common
methods of information losses are
inadvertent disclosure and industrial
espionage. Which of the following is the
third:
a. Newspaper articles
b. Television
c. Magazine articles
d. Theft by an insider
25. Which of the following statements
is incorrect with regard to an
information security program?