PROFESSIONAL STUDY GUIDE (LAW
& JUSTICE 2) QUESTIONS WITH
COMPLETE SOLUTIONS!!
1 of
66
Ter
m
Possibly the chief reason for loss of information about sensitive
operations is attributed to
Give this one a try
later!
"let the master respond". Inadvertent disclosure.
Embezzlement Bombing.
, Don't know?
2 of 66
Term
The Theory X management theory holds that the average
employee has
Give this one a try later!
high motivation, enjoys challenges
and works well under minimal a preference for flexible work hours
supervision. and remote working conditions.
little ambition, dislikes work
and must be coerced,
controlled and directed to a strong desire for teamwork
achieve organizational and collaboration with peers.
objectives.
Don't know?
3 of 66
Term
Eighty percent (80%) of computer security incidents result from
Give this one a try later!
, external hackers targeting the insider attacks by
company's network. dishonest and disgruntled
employees
malware infections from natural disasters affecting the
unverified software downloads. physical infrastructure.
Don't know?
4 of 66
Definition
it must be of competitive advantage, it must be a secret and it
must be used in the business of the owner.
Give this one a try later!
The three (3) basic
requirements of a trade The ionizing fire detector warns of
secret are fire by responding to
The minimum industry standard
when using chain link fencing The theft triangle consist of the
in security applications as per following components
construction is
Don't know?
5 of 66
, Term
Class 2 rated safes are tested to withstand fire for
Give this one a try later!
2 hrs or 120 minutes 1 hr or 300 minutes
1/4 hr or 15 minutes 1 hr or 60 minutes
Don't know?
6 of 66
Term
A facility's data media must be protected in specially insulated
records containers which protect the content against
temperatures up to?
Give this one a try later!
a photoelectric smoke detector. inadvertent disclosure.
300 feet should be established
150 degrees F and 80%
including the floors above and
humidity.
below.
Don't know?