Test Flash Cards 6

(23 cards)

1
Q

What are the three threat catagories in information asset protection?

A
  1. Intentional
  2. Natural
  3. Inadvertent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access to internal information should be restricted to which groups?

A

Company personnel adn those who have signed a nondisclosure agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How should obsolete prototypes, models, and test items be disposed of?

A

They should be destroyed so they can’t be reverse engineered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the best way to start addressing infringements of patents, copyrights, and trademarks?

A

By registering those rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What qualifies something as a trade secret?

A

The information added value or benefit to the owner.
The trade secret was specifically identified, and the owner provided a reasonable level of protection for the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is proprietary information?

A

Information of value, owned by an entity or entrusted to it, which has not been disclosed publicly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two primary aspects of recovery after an information loss?

A
  1. Return to normal business operations as soon as possible
  2. Implement measures to prevent a recurrence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data mining?

A

Software-driven collection of open-source data and public information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What three aspects of information must be protected?

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are five business impacts of an information asset loss event?

A
  1. Loss of company reputation/image/goodwill
  2. Loss of competitive advantage in one product/service
  3. Reducted projected/anticipated returns or profitability
  4. Loss of core business technology or process
  5. Loss of competitive advantage in multiple products/services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Informational assets can take what physical forms?

A

Prototypes and models
Manufacturing processes and equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The strategies used to safeguard information assets typically include what three components?

A
  1. Security measures
  2. Legal protections
  3. Management practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are technical surveillance countermeasures (TSCM)?

A

Services, equipment, and techniques designed to locate, identify, and neutralize technical surveillance activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three key steps to take after an information loss?

A
  1. Investigation
  2. Damage assessment
  3. Recovery and follow-up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are four levels of information classification?

A
  1. Highly restricted
  2. Restricted
  3. Internal Use
  4. Unrestricted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What parties should be considered as potential insider threats? Select all that apply:
1. Employees
2. Nation states
3. Customers
4. Vendors

A
  1. Employees
  2. Customers
  3. Vendors
17
Q

The results of the risk assessment should help in what processes?
1. Designing access control systems
2. Selecting and prioritizing actions for managing risks
3. Insurance options

A
  1. Selecting and prioritizing actions for managing risks
18
Q

Prototypes may exist in what forms? Select all that apply:
1. Paper designs
2. Market test materials
3. Internal memos
4. Software

A
  1. Paper designs
  2. Market test materials
  3. Software
19
Q

What are examples of ‘small bits’ of information that may be pieced together to reveal sensitive information? Select all that apply
1. Website articles
2. Employee records
3. Partnership announcement
4. Supply orders

A
  1. Website articles
  2. Partnership announcement
  3. Supply orders
20
Q

A process by which an organizational user is identified and granted privileges to levels of network information, systems, or resources, is called which of the following?
1. Application security control
2. Logical network access control
3. Application encryption control
4. Digital signature control

A
  1. Logica network access control
21
Q

Which of the following is the keystone for continual improvement in the organization’s ability to effectively manage the security of its information assets?
1. NIST Framework
2. Generally Accepted Information Systems Security Practices
3. ISO/IEC 27001: 2005
4. Red Flag Rules

A
  1. ISO/IEC 27001: 2005
22
Q

How are phishing attacks most commonly carried out?
1. Remote access
2. Social engineering
3. Insider threat
4. Nation state activities

A
  1. Social engineering