A trade secret may be:
A. A formula for a chemical compound
B. A process of manufacturing materials
C. A pattern for a machine
D. A list of customers
E. All of the above
The characteristics of a trade secret as compared with other confidential information are:
A. Those business secrets that have been duly registered pursuant to the requirements of law
B. Continuous or consistent business applications of a secret not known to others, from the use of which some advantage is gained by the user
C. Those business secrets that are fully protected in accordance with the Federal Privacy Act
D. Both A and C
E. All of the above
Which of the following should be part of an effective information security program?
A. Pre-employment screening
B. Nondisclosure agreements from employees
C. Employee awareness programs
D. Policy and procedural statements on the recognition, classification, and handling of sensitive information
E. All of the above
The primary tool of pre-employment screening is the:
A. Application form
B. Interview
C. Polygraph
D. Investigator performing the interview
Which of the following is generally not allowed to be disclosed on an employment questionnaire?
A. Current residence
B. References
C. Prior employment
D. Prior arrests
E. None of the above
What is most likely the main reason for loss of sensitive information?
A. Industrial espionage
B. An employee's loose lips
C. Inadvertent disclosure
D. Deliberate theft by an outsider
E. Both B and C
F. None of the above
Any formula, pattern, device, or compilation of information that is used in one's business and that gives you an opportunity to gain an advantage over competitors who do not use it or know about it is:
A. A patent
B. A trade secret
C. A monopoly
D. Copyrighted material
E. None of the above
The purpose for employing an access control program includes:
A. To protect persons, materials, or information
B. To slow or speed up the rate of movement to, from, or within an establishment
C. To permit or deny entrance
D. Both A and C
E. All of the above
Identification and access control systems have the widest application of:
A. Manual identification systems
B. Magnetic readers
C. Biometric-based systems
D. Dielectric readers
E. None of the above
The performance requirements of any trustworthy system of identification includes:
A. Resistance to surreptitious substitution or counterfeiting
B. Reliability
C. Validity
D. Both B and C
E. All of the above
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only ASIS exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ASIS-CPP exam preparations and ASIS certification application, do not hesitate to visit our Vcedump.com to find your solutions here.