ExamGecko
Home / ASIS / CPP / List of questions
Ask Question

ASIS CPP Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

Title III of the Omnibus Crime Control and Safe Streets Act of 1968 requires that an approval for electronic surveillance must be obtained from the:

Chief Justice of the Supreme Court
Chief Justice of the Supreme Court
Director of the FBI
Director of the FBI
Attorney general of the United States or any specially designated assistant attorney general
Attorney general of the United States or any specially designated assistant attorney general
Director of the CIA
Director of the CIA
All of the above
All of the above
Suggested answer: C
asked 16/09/2024
Jasper Fons
42 questions

Question 122

Report Export Collapse

Criminal violations involving theft of trade secrets could be covered by:

Theft of trade secrets statutes
Theft of trade secrets statutes
Bribery statutes involving trade secrets
Bribery statutes involving trade secrets
Receipt of stolen property statutes
Receipt of stolen property statutes
Criminal conspiracy statutes
Criminal conspiracy statutes
All of the above
All of the above
Suggested answer: E
asked 16/09/2024
Leonelo Sanchez
32 questions

Question 123

Report Export Collapse

The public statute passed to protect personal information in possession of federal agencies is:

The Espionage Statute
The Espionage Statute
The Unauthorized Disclosure Act
The Unauthorized Disclosure Act
The Omnibus Crime Control Act
The Omnibus Crime Control Act
The Privacy Act of 1974
The Privacy Act of 1974
None of the above
None of the above
Suggested answer: D
asked 16/09/2024
Earl Frederick
39 questions

Question 124

Report Export Collapse

The Privacy Act of 1974 provides which of the following safeguards?

Permits individuals to gain access to certain information pertaining to themselves in federal agency records
Permits individuals to gain access to certain information pertaining to themselves in federal agency records
Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual's rights under the Privacy Act of 1974
Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual's rights under the Privacy Act of 1974
All of the above
All of the above
Suggested answer: E
asked 16/09/2024
An Khang Nguyen
50 questions

Question 125

Report Export Collapse

Which of the following would not be permitted to review a student's record according to the Family Educational Rights and the Privacy Act of 1974?

Law enforcement officials
Law enforcement officials
Other school officials
Other school officials
The school's registrar office
The school's registrar office
All of the above
All of the above
None of the above
None of the above
Suggested answer: A
asked 16/09/2024
TANVIR ANJUM
39 questions

Question 126

Report Export Collapse

Which of the following characteristics pertains to a good information management program?

An employee education program for those who utilize the classification system
An employee education program for those who utilize the classification system
Limited number of individuals who can initiate classification of information
Limited number of individuals who can initiate classification of information
Limitation of the duration during which the classification will remain in effect
Limitation of the duration during which the classification will remain in effect
All of the above
All of the above
None of the above
None of the above
Suggested answer: D
asked 16/09/2024
Luis Raul Juarez Cosio
43 questions

Question 127

Report Export Collapse

What are the three most common methods of information loss to be guarded against?

Newspaper articles, magazine articles, television
Newspaper articles, magazine articles, television
Employee payroll, personnel matters, market surveys
Employee payroll, personnel matters, market surveys
Theft by an insider, inadvertent disclosure, industrial espionage
Theft by an insider, inadvertent disclosure, industrial espionage
Employee hirings, magazine articles, industrial espionage E. None of the above
Employee hirings, magazine articles, industrial espionage E. None of the above
Suggested answer: C
asked 16/09/2024
Oscar Luis Garza Ruiz
42 questions

Question 128

Report Export Collapse

The elements of an information security program include:

Informing employees that the information is to be protected
Informing employees that the information is to be protected
Establishing the use of patent or nondisclosure agreements
Establishing the use of patent or nondisclosure agreements
Designation of certain information as sensitive
Designation of certain information as sensitive
Providing the means for employees to protect sensitive information
Providing the means for employees to protect sensitive information
All of the above
All of the above
Suggested answer: E
asked 16/09/2024
david tsai
49 questions

Question 129

Report Export Collapse

Which of the following statements is not true in regard to an information security program?

The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
The protection afforded against losses by either internal or external sources is, at best, limited.
The protection afforded against losses by either internal or external sources is, at best, limited.
A good information security program will provide total protection from industrial espionage.
A good information security program will provide total protection from industrial espionage.
A trust relationship must be established and maintained with employees.
A trust relationship must be established and maintained with employees.
The good will and compliance of employees is crucial for success.
The good will and compliance of employees is crucial for success.
Suggested answer: C
asked 16/09/2024
Abdullah Mousa
53 questions

Question 130

Report Export Collapse

Vital records normally constitute what percentage of the company's total records?

2 percent
2 percent
5 percent
5 percent
10 percent
10 percent
15 percent
15 percent
20 percent
20 percent
Suggested answer: A
asked 16/09/2024
RODRIGO BALISTA
43 questions
Total 766 questions
Go to page: of 77