ExamGecko
Home Home / ASIS / CPP

ASIS CPP Practice Test - Questions Answers, Page 11

Question list
Search
Search

The most secure scrambler in common use is the:

A.
Frequency inverter
A.
Frequency inverter
Answers
B.
Decoder
B.
Decoder
Answers
C.
Laser beam
C.
Laser beam
Answers
D.
Vocoder
D.
Vocoder
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: D

The method used to monitor telephone calls by providing a record of all numbers dialed from a particular phone is called:

A.
Electronic surveillance
A.
Electronic surveillance
Answers
B.
Phone bug
B.
Phone bug
Answers
C.
Wiretap
C.
Wiretap
Answers
D.
Pen register
D.
Pen register
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: D

A small hidden microphone and a radio transmitter are generally known as:

A.
A wiretap
A.
A wiretap
Answers
B.
A bug
B.
A bug
Answers
C.
A beeper
C.
A beeper
Answers
D.
Electronic surveillance
D.
Electronic surveillance
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: B

A specially constructed microphone attached directly to an object or surface to be protected, which responds only when the protected object or surface is disturbed, is known as:

A.
Parabolic microphone
A.
Parabolic microphone
Answers
B.
Special audio microphone
B.
Special audio microphone
Answers
C.
Contact microphone
C.
Contact microphone
Answers
D.
Surreptitious microphone
D.
Surreptitious microphone
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C

A microphone with a disklike attachment that is used for listening to audio from great distances is known as a(n):

A.
Contact microphone
A.
Contact microphone
Answers
B.
Parabolic microphone
B.
Parabolic microphone
Answers
C.
Ultrasonic microphone
C.
Ultrasonic microphone
Answers
D.
Both a and c
D.
Both a and c
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: B

A microphone that is installed on a common wall adjacent to the target area when it is impractical or impossible to enter the target area is known as a:

A.
Carbon microphone
A.
Carbon microphone
Answers
B.
Parabolic microphone
B.
Parabolic microphone
Answers
C.
Contact microphone
C.
Contact microphone
Answers
D.
Dynamic microphone
D.
Dynamic microphone
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C

Which method of protection against telephone line eavesdropping is most reliable?

A.
Don't discuss sensitive information.
A.
Don't discuss sensitive information.
Answers
B.
Use a radio jammer.
B.
Use a radio jammer.
Answers
C.
Use encryption equipment.
C.
Use encryption equipment.
Answers
D.
Both a and c.
D.
Both a and c.
Answers
E.
Use an audio jammer.
E.
Use an audio jammer.
Answers
Suggested answer: D

The unauthorized acquisition or dissemination by an employee of confidential data critical to his or her employer is known as:

A.
Embezzlement
A.
Embezzlement
Answers
B.
Larceny
B.
Larceny
Answers
C.
Industrial espionage
C.
Industrial espionage
Answers
D.
Burglary
D.
Burglary
Answers
E.
False pretenses
E.
False pretenses
Answers
Suggested answer: C

The term 'eavesdropping' refers to:

A.
Wiretapping
A.
Wiretapping
Answers
B.
Bugging
B.
Bugging
Answers
C.
Trash cover
C.
Trash cover
Answers
D.
Both a and b
D.
Both a and b
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: D

Which of the following methods could be used as a form of eavesdropping using a telephone instrument?

A.
Wiring can be altered so the handset or receiver will act as an open microphone.
A.
Wiring can be altered so the handset or receiver will act as an open microphone.
Answers
B.
A radio transmitter can be concealed in the mouthpiece.
B.
A radio transmitter can be concealed in the mouthpiece.
Answers
C.
The infinity transmitter can be used.
C.
The infinity transmitter can be used.
Answers
D.
Both band c.
D.
Both band c.
Answers
E.
All of the above.
E.
All of the above.
Answers
Suggested answer: E
Total 766 questions
Go to page: of 77