ExamGecko
Home Home / ASIS / CPP

ASIS CPP Practice Test - Questions Answers, Page 13

Question list
Search
Search

Title III of the Omnibus Crime Control and Safe Streets Act of 1968 requires that an approval for electronic surveillance must be obtained from the:

A.
Chief Justice of the Supreme Court
A.
Chief Justice of the Supreme Court
Answers
B.
Director of the FBI
B.
Director of the FBI
Answers
C.
Attorney general of the United States or any specially designated assistant attorney general
C.
Attorney general of the United States or any specially designated assistant attorney general
Answers
D.
Director of the CIA
D.
Director of the CIA
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: C

Criminal violations involving theft of trade secrets could be covered by:

A.
Theft of trade secrets statutes
A.
Theft of trade secrets statutes
Answers
B.
Bribery statutes involving trade secrets
B.
Bribery statutes involving trade secrets
Answers
C.
Receipt of stolen property statutes
C.
Receipt of stolen property statutes
Answers
D.
Criminal conspiracy statutes
D.
Criminal conspiracy statutes
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: E

The public statute passed to protect personal information in possession of federal agencies is:

A.
The Espionage Statute
A.
The Espionage Statute
Answers
B.
The Unauthorized Disclosure Act
B.
The Unauthorized Disclosure Act
Answers
C.
The Omnibus Crime Control Act
C.
The Omnibus Crime Control Act
Answers
D.
The Privacy Act of 1974
D.
The Privacy Act of 1974
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: D

The Privacy Act of 1974 provides which of the following safeguards?

A.
Permits individuals to gain access to certain information pertaining to themselves in federal agency records
A.
Permits individuals to gain access to certain information pertaining to themselves in federal agency records
Answers
B.
Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
B.
Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
Answers
C.
Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
C.
Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
Answers
D.
Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual's rights under the Privacy Act of 1974
D.
Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual's rights under the Privacy Act of 1974
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: E

Which of the following would not be permitted to review a student's record according to the Family Educational Rights and the Privacy Act of 1974?

A.
Law enforcement officials
A.
Law enforcement officials
Answers
B.
Other school officials
B.
Other school officials
Answers
C.
The school's registrar office
C.
The school's registrar office
Answers
D.
All of the above
D.
All of the above
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: A

Which of the following characteristics pertains to a good information management program?

A.
An employee education program for those who utilize the classification system
A.
An employee education program for those who utilize the classification system
Answers
B.
Limited number of individuals who can initiate classification of information
B.
Limited number of individuals who can initiate classification of information
Answers
C.
Limitation of the duration during which the classification will remain in effect
C.
Limitation of the duration during which the classification will remain in effect
Answers
D.
All of the above
D.
All of the above
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: D

What are the three most common methods of information loss to be guarded against?

A.
Newspaper articles, magazine articles, television
A.
Newspaper articles, magazine articles, television
Answers
B.
Employee payroll, personnel matters, market surveys
B.
Employee payroll, personnel matters, market surveys
Answers
C.
Theft by an insider, inadvertent disclosure, industrial espionage
C.
Theft by an insider, inadvertent disclosure, industrial espionage
Answers
D.
Employee hirings, magazine articles, industrial espionage E. None of the above
D.
Employee hirings, magazine articles, industrial espionage E. None of the above
Answers
Suggested answer: C

The elements of an information security program include:

A.
Informing employees that the information is to be protected
A.
Informing employees that the information is to be protected
Answers
B.
Establishing the use of patent or nondisclosure agreements
B.
Establishing the use of patent or nondisclosure agreements
Answers
C.
Designation of certain information as sensitive
C.
Designation of certain information as sensitive
Answers
D.
Providing the means for employees to protect sensitive information
D.
Providing the means for employees to protect sensitive information
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: E

Which of the following statements is not true in regard to an information security program?

A.
The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
A.
The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
Answers
B.
The protection afforded against losses by either internal or external sources is, at best, limited.
B.
The protection afforded against losses by either internal or external sources is, at best, limited.
Answers
C.
A good information security program will provide total protection from industrial espionage.
C.
A good information security program will provide total protection from industrial espionage.
Answers
D.
A trust relationship must be established and maintained with employees.
D.
A trust relationship must be established and maintained with employees.
Answers
E.
The good will and compliance of employees is crucial for success.
E.
The good will and compliance of employees is crucial for success.
Answers
Suggested answer: C

Vital records normally constitute what percentage of the company's total records?

A.
2 percent
A.
2 percent
Answers
B.
5 percent
B.
5 percent
Answers
C.
10 percent
C.
10 percent
Answers
D.
15 percent
D.
15 percent
Answers
E.
20 percent
E.
20 percent
Answers
Suggested answer: A
Total 766 questions
Go to page: of 77