Which of the following is not correct in regard to microwave transmissions?
A. Microwave signals penetrate fog and snow.
B. Microwave signals are transmitted in short radio waves.
C. A large number of microwave signals can be transmitted.
D. Microwave signals travel in curved lines.
E. Microwave signals are not affected by ordinary man-made noise.
F. None of the above.
Electromagnetic radiation is detectable electromagnetic energy that is generated by electronic information processing devices. Which' of the following is used to protect very sensitive equipment?
A. A current carrier device
B. Pneumatic cavity shielding
C. Tempest shielding
D. Pen register shielding
The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:
A. Bugging
B. Veiling
C. Tempest
D. All of the above
E. None of the above
A term used to indicate a method of disguising information so that it is unintelligible to those who should not obtain it is:
A. Interconnection decoy
B. Multiplexing
C. Scrambling
D. Mixed signal
E. None of the above
A "trash cover" is:
A. A sealed cover on a trash container
B. The process of examining one's trash for information
C. Placing the company's trash in a locked container
D. Both A and C
E. All of the above
Which of the following would not be considered in the "trade secret" category?
A. Salary data
B. Market surveys
C. Personnel matters
D. Customer usage evaluations
E. All of the above
Litigations concerning former employees involving trade secrets have some problems. Which of the following is considered to be such a problem?
A. The cost of litigations is too high and the owner of the trade secret may lose.
B. Litigation is a waste of time.
C. The owner of the trade secret may have to expose the information that is being protected.
D. Both A and C.
E. All of the above.
When a loss of proprietary information is discovered, which of the following steps should be taken first?
A. Attempt to recover the material.
B. Attempt to apprehend the perpetrators.
C. Assess economic damage.
D. Re-evaluate the protection system.
E. All of the above.
In devising proprietary information procedures, which of the following is considered to be a main area of paper or document vulnerability?
A. Comprehensive paper controls
B. A technical report system
C. Control and issue of notebooks
D. All of the above
E. None of the above
Which of the following should be made part of a proprietary information protection program?
A. Pre-employment screening
B. Effective perimeter control system
C. Execution of patent and secrecy agreement
D. Paper and data control
E. Both A and C
F. All of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only ASIS exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ASIS-CPP exam preparations and ASIS certification application, do not hesitate to visit our Vcedump.com to find your solutions here.