ExamGecko
Home Home / ASIS / CPP

ASIS CPP Practice Test - Questions Answers, Page 9

Question list
Search
Search

In regard to a trade secret, it may be decided that its disclosure by another was innocent, rather than wrongful, even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

A.
The trade secret was not registered
A.
The trade secret was not registered
Answers
B.
The trade secret did not involve national defense information
B.
The trade secret did not involve national defense information
Answers
C.
The trade secret was not in current use
C.
The trade secret was not in current use
Answers
D.
There is absence of evidence that an owner has taken reason- able precautions to protect confidential information.
D.
There is absence of evidence that an owner has taken reason- able precautions to protect confidential information.
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: D

Proprietary information is:

A.
Private information of a highly sensitive nature
A.
Private information of a highly sensitive nature
Answers
B.
Information that must be classified according to executive order of the U.S Government
B.
Information that must be classified according to executive order of the U.S Government
Answers
C.
Sensitive information that is classified according to executive order of the U.S. Government
C.
Sensitive information that is classified according to executive order of the U.S. Government
Answers
D.
Anything that an enterprise considers relevant to its status or opera
D.
Anything that an enterprise considers relevant to its status or opera
Answers
Suggested answer: D

The class of person under a duty to safeguard a proprietary secret is known as a(n):

A.
Agent
A.
Agent
Answers
B.
Proprietary security employee
B.
Proprietary security employee
Answers
C.
Fiduciary
C.
Fiduciary
Answers
D.
Business associate
D.
Business associate
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C

It is important for employees to know whether confidential information is a trade secret, or some other confidential material, because:

A.
If it is a trade secret, the employee may be prevented from disclosing t by injunction.
A.
If it is a trade secret, the employee may be prevented from disclosing t by injunction.
Answers
B.
If not a trade secret and it is disclosed, the employer must take action after the disclosure and must be able to prove some actual damage in order to recover
B.
If not a trade secret and it is disclosed, the employer must take action after the disclosure and must be able to prove some actual damage in order to recover
Answers
C.
If not a trade secret, the information once disclosed is no longer defendable
C.
If not a trade secret, the information once disclosed is no longer defendable
Answers
D.
If not a trade secret, the information once disclosed cannot be further prevented from disclosure by an injunction
D.
If not a trade secret, the information once disclosed cannot be further prevented from disclosure by an injunction
Answers
E.
All of the above.
E.
All of the above.
Answers
Suggested answer: E

Which of the following is not a correct statement as a general rule involving the protection of proprietary information?

A.
As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
A.
As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
Answers
B.
By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
B.
By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
Answers
C.
Other than the employees, any other persons to be bound to secrecy must agree to be so bound
C.
Other than the employees, any other persons to be bound to secrecy must agree to be so bound
Answers
D.
Any agreements to be bound must always be in writing and are not implied from acts
D.
Any agreements to be bound must always be in writing and are not implied from acts
Answers
Suggested answer: D

To effectively involve the law for the protection of sensitive information, the owner of the proprietary information must be able to show 'objective indications of attempts to protect secrecy.' Which of the following has been recognized in the past as such an indication?

A.
Use of warning signs to alert employees to sensitive data and the places it is stored
A.
Use of warning signs to alert employees to sensitive data and the places it is stored
Answers
B.
Separately storing sensitive information in security containers with the appropriate security precautions
B.
Separately storing sensitive information in security containers with the appropriate security precautions
Answers
C.
Special instructions providing a 'need-to-know' basis
C.
Special instructions providing a 'need-to-know' basis
Answers
D.
Restrictions to nonemployee access to places containing sensitive information
D.
Restrictions to nonemployee access to places containing sensitive information
Answers
E.
All of the above
E.
All of the above
Answers
Suggested answer: E

Which of the following should be made part of a proprietary. information protection program?

A.
Pre-employment screening
A.
Pre-employment screening
Answers
B.
Effective perimeter control system
B.
Effective perimeter control system
Answers
C.
Execution of patent and secrecy agreement
C.
Execution of patent and secrecy agreement
Answers
D.
Paper and data control
D.
Paper and data control
Answers
E.
Both a and c
E.
Both a and c
Answers
F.
All of the above
F.
All of the above
Answers
Suggested answer: F

In designing a proprietary information protection program, the area of greatest vulnerability is:

A.
Personnel files
A.
Personnel files
Answers
B.
Employees
B.
Employees
Answers
C.
Computers
C.
Computers
Answers
D.
Marketing data
D.
Marketing data
Answers
E.
Perimeter boundaries
E.
Perimeter boundaries
Answers
Suggested answer: B

In devising proprietary information procedures, which of the following is considered to be a main area of paper or document vulnerability?

A.
Comprehensive paper controls
A.
Comprehensive paper controls
Answers
B.
A technical report system
B.
A technical report system
Answers
C.
Control and issue of notebooks
C.
Control and issue of notebooks
Answers
D.
All of the above
D.
All of the above
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: B

When a loss of proprietary information is discovered, which of the following steps should be taken first?

A.
Attempt to recover the material.
A.
Attempt to recover the material.
Answers
B.
Attempt to apprehend the perpetrators.
B.
Attempt to apprehend the perpetrators.
Answers
C.
Assess economic damage.
C.
Assess economic damage.
Answers
D.
Re-evaluate the protection system.
D.
Re-evaluate the protection system.
Answers
E.
All of the above.
E.
All of the above.
Answers
Suggested answer: E
Total 766 questions
Go to page: of 77