100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ASIS APP EXAM- Flashcards 2025 Edition| QUESTIONS AND WELL VERIFIED ANSWERS |ACTUAL EXAM 100%

Rating
-
Sold
-
Pages
83
Grade
A+
Uploaded on
21-01-2025
Written in
2024/2025

ASIS APP EXAM- Flashcards 2025 Edition| QUESTIONS AND WELL VERIFIED ANSWERS |ACTUAL EXAM 100%

Institution
ASIS App
Course
ASIS app











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ASIS app
Course
ASIS app

Document information

Uploaded on
January 21, 2025
Number of pages
83
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

ASIS APP EXAM- Flashcards 2025 Edition|
QUESTIONS AND WELL VERIFIED ANSWERS
|ACTUAL EXAM 100%
What are the three threat categories in information asset protection? -
✔✔Intentional
Natural,
Inadvertent


To assess these types of threats, one must identify potential adversaries and evaluate
their capability and intention to target key information assets. - ✔✔Intentional
Threats


These types of threats can be attributed to inadequate employee training,
misunderstanding, lack of attention to detail, lax security enforcement, pressure to
produce deliverables, and insufficient staffing. - ✔✔Inadvertent Threats



How does layered protection apply to information protection? - ✔✔Apply multiple
levels of protection to information assets,
Ensure that layers of protection complement each other,
Build a coordinated strategy that integrates families of protective measures (e.g.
technical, physical, access control).



Access to internal information should be restricted to which groups? - ✔✔Company
personnel and those who have signed a nondisclosure agreement.



How should obsolete prototypes, models, and test items be disposed of? - ✔✔They
should be destroyed so they can't be reverse engineered.

,What is a patent? - ✔✔Information that has the government grant of a right,
privilege, or authority to exclude others from making, using, marketing, selling, offering
for sale, or importing an invention for a specified period granted to the inventor if the
device or process is novel, useful, and non-obvious.



What is a trademark? - ✔✔Legal protection for words, names, symbols, devices, or
images applied to products or used in connection with goods or services to identify their
source.



What is a copyright? - ✔✔A property right in an original work of authorship fixed in
any tangible medium of expression, giving the holder the exclusive right to reproduce,
adapt, distribute, perform, and display the work.


What is the best way to start addressing infringements of patents, copyrights, and
trademarks? - ✔✔By registering those rights.



What are four response options when a copyright has been violated? - ✔✔Hire legal
counsel,
Informing the proper authorities,
Conducting investigations, raids, and seizures,
Initiating civil litigation, administrative proceedings, and criminal prosecutions.



What qualifies something as a trade secret? - ✔✔The information added value or
benefit to the owner,
The trade secret was specifically identified, and
The owner provided a reasonable level of protection for the information.

,What is a non-disclosure agreement? - ✔✔A legal contract that establishes a
relationship between two or more parties outlining confidentiality and the responsibility
of protecting information.



What is proprietary information? - ✔✔Information of value, owned by an entity or
entrusted to it, which has not been disclosed publicly.



What are the two primary aspects of recovery after an information loss? - ✔✔Return
to normal business operations as soon as possible,
Implement measures to prevent a recurrence.



What is confidentiality? - ✔✔The ability to control the authorization to observe,
access, share, or disseminate information.


When is it appropriate to recycle papers that contain proprietary information? -
✔✔When the papers have been properly destroyed.



What is data mining? - ✔✔Software-driven collection of open-source data and public
information.


What are three ways to solidify confidentiality expectations in employees and business
partners? - ✔✔Confidentiality,
Intellectual property,
Nondisclosure agreements.



What is counterfeiting? - ✔✔The manufacturing or distribution of goods under
someone else's name, and without their permission.

, What is piracy? - ✔✔The act of copying, stealing, reproducing, transmitting, or selling
the intellectual property of another without consent.



What three aspects of information must be protected? - ✔✔Confidentiality,
Integrity,
Availabilty.


What should be included in regularly performed information asset protection risk
assessments? - ✔✔Risk monitoring to address changes in security requirements as
well as changes in the nature of the information assets, threats, frequency of threat
occurrence, vulnerabilities, and impacts.



What are five business impacts of an information asset loss event? - ✔✔Loss of
company reputation/image/goodwill,
Loss of competitive advantage in one product/service,
Reduced projected/anticipated returns or profitability,
Loss of core business technology or process,
Loss of competitive advantage in multiple products/services.



To what extent should information asset protection programs be tailored? - ✔✔The
organization's size, type, strategy, mission, and operating environment.



What is the purpose of marking information that warrants protection? - ✔✔The
marking distinguishes the sensitivity of the information and the degree of protection
warranted.


What personnel matters play a role in information asset protection programs? -
✔✔Due diligence investigations of potential partners,

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
348
Member since
2 year
Number of followers
104
Documents
38635
Last sold
4 days ago

3.4

59 reviews

5
26
4
8
3
7
2
2
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions