Cyber Security: Chapter 21

Cyber Security: Chapter 21

Professional Development

10 Qs

quiz-placeholder

Similar activities

Exercise: Information and Computer Security

Exercise: Information and Computer Security

Professional Development

8 Qs

PRE- TEST

PRE- TEST

Professional Development

10 Qs

Chapter 1:  Concepts and Theories of Asset Protection

Chapter 1: Concepts and Theories of Asset Protection

Professional Development

10 Qs

SLOT 3_PD

SLOT 3_PD

Professional Development

10 Qs

GDPR for H & G Band

GDPR for H & G Band

Professional Development

10 Qs

IFRS

IFRS

Professional Development

10 Qs

INFOSEC WEEK DAY 3

INFOSEC WEEK DAY 3

Professional Development

10 Qs

INTELLIGENCE SECURITY QUIZ NO. 1 SET A

INTELLIGENCE SECURITY QUIZ NO. 1 SET A

Professional Development

15 Qs

Cyber Security: Chapter 21

Cyber Security: Chapter 21

Assessment

Quiz

Other

Professional Development

Easy

Created by

Darnell McCray

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Computer security, information security, and information technology (IT) security all mean the same thing and are interchangeable terms.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Counterintelligence is an important function and can be applied in private sector companies as well as in government agencies.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Legal measures are generally “reactive” rather than “proactive” in nature.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Company's value generally lies in information and intangible assets?

90%

50%

10%

75%

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The practice of asset protection focuses on which categories of “assets”?

Information

Physical

People

Property

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of the Economic Espionage Act of 1996?

Federal crime to steal trade secrets

It is forward-looking piece of legislation

In includes "altering" information as a prohibited act

It must be updated every 5 years

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to this chapter, the field of "information security" includes:

Competitive intelligence

IT Security

Intellectual Property Protection

Traditional Information Security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?