click below
click below
Normal Size Small Size show me how
CPO Study Guide
Chapter 21
| Question | Answer |
|---|---|
| 1. Computer security, information security, and information technology (IT) security all mean the same thing and are interchangeable terms. a. True b. False | a. True b. False● |
| 2. Counterintelligence is an important function and can be applied in private sector companies as well as in government agencies. a. True b. False | a. True● b. False |
| 3. Legal measures are generally “reactive” rather than “proactive” in nature. a. True b. False | a. True● b. False |
| 4.Company's value generally lies in information and intangible assets? a. 90% b. 50% c. 10% d. 75% | a. 90% b. 50% c. 10% d. 75%● |
| 5. The practice of asset protection focuses on which categories of “assets”? (Circle all that apply.) a. Information b. Physical c. People d. Property | a. Information● b. Physical c. People● d. Property● |
| 6. NOT a characteristic of the Economic Espionage Act of 1996? a. Federal crime to steal trade secrets b. It is a forward-looking piece of legislation c. It includes “altering” information as a prohibited act d. It must be updated every 5 years | a. Federal crime to steal trade secrets b. It is a forward-looking piece of legislation c. It includes “altering” information as a prohibited act d. It must be updated every 5 years● |
| 7. According to this chapter, the field of “information security” includes: a. Competitive intelligence b. IT security c. Intellectual property protection d. Traditional information security | a. Competitive intelligence● b. IT security c. Intellectual property protection d. Traditional information security |
| 8. When an information loss is known or suspected, the following actions should be taken: a. Corrective actions b. Damage assessment c. Containment d. Determine root cause | a. Corrective actions b. Damage assessment● c. Containment d. Determine root cause |
| 9. Information that is lost is not permanently lost a. True b. False | a. True b. False● |
| 10. An important tool in protecting information assets is the economic Espionage Act (EEA) of 1996 a. True b. False | a. True● b. False |