ExamGecko
Home Home / ASIS / CPP

ASIS CPP Practice Test - Questions Answers, Page 10

Question list
Search
Search

Which of the following would not be considered in the 'trade secret' category?

A.
Salary data
A.
Salary data
Answers
B.
Market surveys
B.
Market surveys
Answers
C.
Personnel matters
C.
Personnel matters
Answers
D.
Customer usage evaluations
D.
Customer usage evaluations
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: E

Litigations concerning former employees involving trade secrets have some problems.

Which of the following is considered to be such a problem?

A.
The cost of litigations is too high and the owner of the trade secret may lose.
A.
The cost of litigations is too high and the owner of the trade secret may lose.
Answers
B.
Litigation is a waste of time.
B.
Litigation is a waste of time.
Answers
C.
The owner of the trade secret may have to expose the information that is being protected.
C.
The owner of the trade secret may have to expose the information that is being protected.
Answers
D.
Both a and c.
D.
Both a and c.
Answers
E.
All of the above.
E.
All of the above.
Answers
Suggested answer: D

A 'trash cover' is:

A.
A sealed cover on a trash container
A.
A sealed cover on a trash container
Answers
B.
The process of examining one's trash for information
B.
The process of examining one's trash for information
Answers
C.
Placing the company's trash in a locked container
C.
Placing the company's trash in a locked container
Answers
D.
Both a and c
D.
Both a and c
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: B

Sound waves too high in frequency to be heard by the human ear, generally above 20

kHz, are known as:

A.
High-frequency sound waves
A.
High-frequency sound waves
Answers
B.
Microwave waves
B.
Microwave waves
Answers
C.
Ultrasonic waves
C.
Ultrasonic waves
Answers
D.
Short-frequency sound waves
D.
Short-frequency sound waves
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C

The process of combining a number of transmission into one composite signal to be sent over one link is called:

A.
Transmission integrity
A.
Transmission integrity
Answers
B.
Communication integration
B.
Communication integration
Answers
C.
A demultiplexer
C.
A demultiplexer
Answers
D.
Multiplexing
D.
Multiplexing
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: D

Which of the following applies to the laser as a means of communication?

A.
Line of sight transmission is necessary.
A.
Line of sight transmission is necessary.
Answers
B.
Poor weather conditions interfere with the beam.
B.
Poor weather conditions interfere with the beam.
Answers
C.
It is practically impossible to intercept the beam without detection.
C.
It is practically impossible to intercept the beam without detection.
Answers
D.
Both a and c.
D.
Both a and c.
Answers
E.
All of the above.
E.
All of the above.
Answers
Suggested answer: E

Which of the following is not correct in regard to microwave transmissions?

A.
Microwave signals penetrate fog and snow.
A.
Microwave signals penetrate fog and snow.
Answers
B.
Microwave signals are transmitted in short radio waves.
B.
Microwave signals are transmitted in short radio waves.
Answers
C.
A large number of microwave signals can be transmitted.
C.
A large number of microwave signals can be transmitted.
Answers
D.
Microwave signals travel in curved lines.
D.
Microwave signals travel in curved lines.
Answers
E.
Microwave signals are not affected by ordinary man-made noise.
E.
Microwave signals are not affected by ordinary man-made noise.
Answers
F.
None of the above.
F.
None of the above.
Answers
Suggested answer: D

Electromagnetic radiation is detectable electromagnetic energy that is generated by electronic information processing devices. Which' of the following is used to protect very sensitive equipment?

A.
A current carrier device
A.
A current carrier device
Answers
B.
Pneumatic cavity shielding
B.
Pneumatic cavity shielding
Answers
C.
Tempest shielding
C.
Tempest shielding
Answers
D.
Pen register shielding
D.
Pen register shielding
Answers
Suggested answer: C

The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:

A.
Bugging
A.
Bugging
Answers
B.
Veiling
B.
Veiling
Answers
C.
Tempest
C.
Tempest
Answers
D.
All of the above
D.
All of the above
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C

A term used to indicate a method of disguising information so that it is unintelligible to those who should not obtain it is:

A.
Interconnection decoy
A.
Interconnection decoy
Answers
B.
Multiplexing
B.
Multiplexing
Answers
C.
Scrambling
C.
Scrambling
Answers
D.
Mixed signal
D.
Mixed signal
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C
Total 766 questions
Go to page: of 77