Information Security and Counterintelligence

Information Security and Counterintelligence

11th Grade

10 Qs

quiz-placeholder

Similar activities

LJ-2 Unit 6 Review (IT and Counterintelligence)

LJ-2 Unit 6 Review (IT and Counterintelligence)

9th - 12th Grade

10 Qs

Balance Sheet

Balance Sheet

11th Grade

10 Qs

Professional Communications

Professional Communications

10th - 12th Grade

13 Qs

FAFSA

FAFSA

9th - 12th Grade

15 Qs

HIPAA

HIPAA

11th - 12th Grade

15 Qs

Communication & Networking - Client Server & Peer to Peer

Communication & Networking - Client Server & Peer to Peer

2nd - 12th Grade

10 Qs

Identity Theft

Identity Theft

9th - 12th Grade

15 Qs

Among Us

Among Us

KG - Professional Development

14 Qs

Information Security and Counterintelligence

Information Security and Counterintelligence

Assessment

Quiz

Other

11th Grade

Medium

Used 21+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Computer security, Information security, and information technology security all mean the same thing and are interchangable.

True

False

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Counterintelligence is an important function and can be applied in private sector companies as well as in government agencies.

True

False

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Legal measures are generally "reactive" rather than "proactive" in nature.

True

False

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

According to consultant Michael Moberly, approximately what percentage of a company's value generally lies in information and intangible assets?

90%

50%

10%

75%

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

The practice of asset protection focuses on which catagories of "assets"?

Information

Physical

People

Property

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a characteristic of the economic Espionage Act of 1996?

It makes it a federal crime to steal trade secrets

It is a forward-looking piece og legislation

It includes "altering" information as a prohibited act

It must be updated every five years

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

According to this chapter, the feild of "information security" includes:

Competative intelligence

IT security

Intellectual property protection

Traditional information security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?