Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
Company's might inadvertently divulge confidential information in job postings |
True |
|
The primary reason for a company's management to construct an electronically and acoustically shielded quiet room used to protect the company's computer servers and other sensitive electronic equipment. |
False |
|
Shareholders reports and Company newsletters might give a competitor valuable information about a company's products secrets. |
True |
|
Research and development Personnel often inadvertently divulge confidential information through which of the following? A. Hiring outside academic professionals B. Discussions with colleagues at conferences C. Articles written for industry journals D. All of these answers are correct |
All of these answers are correct |
|
Lack of employee education concerning non-disclosure agreements is one of the primary reasons employees communicate confidential information to outside parties. |
True |
|
Employees are often willing to abide by non-disclosure agreements, but they sometimes do not understand the information they are communicating might be confidential. |
True |
|
Having sensitive trash disposed of by a bonded Waste Disposal Company, sending and receiving mail at a secure site, and employing a perimeter security system at the office are all measures aimed to do which of the following? A. Prevent misappropriation of office supplies B. Catch a fraudster in the act C. Guard manual file systems D. Protect digital documentation |
Guard manual file systems |
|
Which of the following is a poor information security procedure that contributes to loss of proprietary information? A. Failure to implement data retention and destruction policies B. Failure to practice data minimization C. Failure to guard documents maintained in manual file systems D. All of these answers are correct |
All of these answers are correct |
|
If a company hires an employee from a competitor, it might open itself up to claims from the competitor that it is unlawfully using proprietary information taken by the employee |
True |
|
Visitors to a company's facilities should be allowed unrestricted access as long as they have signed in as a visitor in the company's log book and have been issued a visitor's badge. |
False |
|
When should an employee be made aware of the need to maintain the confidentiality of an organization's proprietary information, as well as which information is considered confidential? A. During an exit interview B. Upon being fired C. When signing a non-disclosure agreement D. All of these answers are correct |
All of these answers are correct |
|
When a fraudster calls up someone at the Target company and cajoles or tricks the person into providing valuable information, that corporate Espionage technique is referred to as which of the following? |
Social engineering |
|
A fraudster calls a Company employee and request sensitive information while claiming to be a co-worker whose systems are down. This is an example of... |
Social engineering |
|
Publicly available information that anyone can lawfully obtained By Request, purchase, or observation is known as... |
Open source information |
|
Which department is known for divulging proprietary information to the public through such mediums as academic journals and Conference presentations? |
Research and development |
|
When developing a program for safeguarding proprietary information, and organization should form a company task force to develop the program, and the task force should include representatives from relevant departments all across the country, such as research and development, corporate security, and Records management. |
True |
|
One method competitive intelligence professionals commonly used to gather data that a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is best described as conducting surveillance. |
False |
|
To help promote employee awareness of sensitive information, company data should be classified into different security levels based on value and sensitivity. |
True |
|
A corporate spy poses as a customer of a competing company to elicit information from the competitors salespeople, this illustrates the concept of... |
Human intelligence |
|
Which of the following is a commonly used method by fraudsters to physically infiltrate and spy on organizations? A. Fabricate or steal an employee badge B. Secure a position as an employee C. Pose as a contractor D. All of these answers are correct |
All of these answers are correct |
|
Favorite targets for intelligence-gathering purposes include employees in all of the following departments except: A. Manufacturing and production B. Research and devlopment C. Shipping and receiving D. Marketing |
Shipping and receiving |
|
When a task force is charged with developing a program for safeguarding proprietary information, which of the following should be the first step that it takes? A. Determine what information should be protected B. Shred sensitive documents C. Institute an encryption policy D. Develop an employee awareness program |
Determine what information should be protected |
|
When an employee signs a legally enforceable non-competition agreements, the provisions of the non-competition agreement continue after the employee leaves the company where he signed the agreement. |
True |
|
Non-disclosure agreements are generally an expensive and inefficient means of protecting an organization's proprietary information. |
False |
|
Calendars and schedules displayed at an employee's workstation can inadvertently provide a company's competitors with valuable proprietary information. |
True |
|
For corporate Espionage purposes, technical surveillance generally consists of gathering documentary evidence or information that can be found via open sources. |
False |
|
Which of the following is a common avenue through which proprietary company information is compromised? A. Company website B. Publications C. Speeches by executives D. All of the above |
All of the above |
|
The following best illustrates the use of technical surveillance for purposes of corporate espionage |
A spy hacks into a Target computer and monitors an employee's Communications |