
Chapter 21: Information Security and Counterintelligence
Authored by Jason Montijo
Other
Professional Development
Used 32+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Computer security, information security, and information technology (IT) security all mean the same thing and are interchangeable terms.
True
False
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Counterintelligence is an important function and can be applied in private sector companies as well as in government agencies.
True
False
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Legal measures are generally “ reactive ” rather than “ proactive ” in nature.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to consultant Michael Moberly, approximately what percentage of a company’s value generally lies in information and intangible assets?
90%
50%
10%
75%
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The practice of asset protection focuses on which categories of “ assets ” ? (Circle all that apply.)
Information
Physical
People
Property
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of the Economic Espionage Act of 1996?
It makes it a federal crime to steal trade secrets
It is a forward-looking piece of legislation
It includes “ altering ” information as a prohibited act
It must be updated every 5 years
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to this chapter, the field of “ information security ” includes:
Competitive intelligence
IT security
Intellectual property protection
Traditional information security
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?