• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back

Company's might inadvertently divulge confidential information in job postings

True

The primary reason for a company's management to construct an electronically and acoustically shielded quiet room used to protect the company's computer servers and other sensitive electronic equipment.

False

Shareholders reports and Company newsletters might give a competitor valuable information about a company's products secrets.

True

Research and development Personnel often inadvertently divulge confidential information through which of the following?



A. Hiring outside academic professionals


B. Discussions with colleagues at conferences


C. Articles written for industry journals


D. All of these answers are correct

All of these answers are correct

Lack of employee education concerning non-disclosure agreements is one of the primary reasons employees communicate confidential information to outside parties.

True

Employees are often willing to abide by non-disclosure agreements, but they sometimes do not understand the information they are communicating might be confidential.

True

Having sensitive trash disposed of by a bonded Waste Disposal Company, sending and receiving mail at a secure site, and employing a perimeter security system at the office are all measures aimed to do which of the following?



A. Prevent misappropriation of office supplies


B. Catch a fraudster in the act


C. Guard manual file systems


D. Protect digital documentation

Guard manual file systems

Which of the following is a poor information security procedure that contributes to loss of proprietary information?



A. Failure to implement data retention and destruction policies


B. Failure to practice data minimization


C. Failure to guard documents maintained in manual file systems


D. All of these answers are correct

All of these answers are correct

If a company hires an employee from a competitor, it might open itself up to claims from the competitor that it is unlawfully using proprietary information taken by the employee

True

Visitors to a company's facilities should be allowed unrestricted access as long as they have signed in as a visitor in the company's log book and have been issued a visitor's badge.

False

When should an employee be made aware of the need to maintain the confidentiality of an organization's proprietary information, as well as which information is considered confidential?



A. During an exit interview


B. Upon being fired


C. When signing a non-disclosure agreement


D. All of these answers are correct

All of these answers are correct

When a fraudster calls up someone at the Target company and cajoles or tricks the person into providing valuable information, that corporate Espionage technique is referred to as which of the following?

Social engineering

A fraudster calls a Company employee and request sensitive information while claiming to be a co-worker whose systems are down. This is an example of...

Social engineering

Publicly available information that anyone can lawfully obtained By Request, purchase, or observation is known as...

Open source information

Which department is known for divulging proprietary information to the public through such mediums as academic journals and Conference presentations?

Research and development

When developing a program for safeguarding proprietary information, and organization should form a company task force to develop the program, and the task force should include representatives from relevant departments all across the country, such as research and development, corporate security, and Records management.

True

One method competitive intelligence professionals commonly used to gather data that a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is best described as conducting surveillance.

False

To help promote employee awareness of sensitive information, company data should be classified into different security levels based on value and sensitivity.

True

A corporate spy poses as a customer of a competing company to elicit information from the competitors salespeople, this illustrates the concept of...

Human intelligence

Which of the following is a commonly used method by fraudsters to physically infiltrate and spy on organizations?



A. Fabricate or steal an employee badge


B. Secure a position as an employee


C. Pose as a contractor


D. All of these answers are correct

All of these answers are correct

Favorite targets for intelligence-gathering purposes include employees in all of the following departments except:



A. Manufacturing and production


B. Research and devlopment


C. Shipping and receiving


D. Marketing

Shipping and receiving

When a task force is charged with developing a program for safeguarding proprietary information, which of the following should be the first step that it takes?



A. Determine what information should be protected


B. Shred sensitive documents


C. Institute an encryption policy


D. Develop an employee awareness program

Determine what information should be protected

When an employee signs a legally enforceable non-competition agreements, the provisions of the non-competition agreement continue after the employee leaves the company where he signed the agreement.

True

Non-disclosure agreements are generally an expensive and inefficient means of protecting an organization's proprietary information.

False

Calendars and schedules displayed at an employee's workstation can inadvertently provide a company's competitors with valuable proprietary information.

True

For corporate Espionage purposes, technical surveillance generally consists of gathering documentary evidence or information that can be found via open sources.

False

Which of the following is a common avenue through which proprietary company information is compromised?



A. Company website


B. Publications


C. Speeches by executives


D. All of the above

All of the above

The following best illustrates the use of technical surveillance for purposes of corporate espionage

A spy hacks into a Target computer and monitors an employee's Communications