Which of the following is a recommended method for safeguarding an organization's proprietary information?
A. Requiring employees to make notes and keep drafts related to confidential projects
B. Educating employees about nondisclosure agreements when they are hired and during exit interviews
C. Changing locks and reprogramming door access codes every three to five years
D. Classifying data into security access levels based on the number of years that employees have worked for the company
正解:B
質問 2:
In ____________ scheme, a supplier pays an employee of the purchasing company to write specifications that will require amendments at a later date.
A. Deliberate writing of vague specifications
B. False specification
C. Need recognition
D. Bid-splitting
正解:A
質問 3:
________ decrease assets and expenses and/or increase liabilities and/or equity
A. Debit
B. Credit
C. None of all
D. Journal Entries
正解:B
質問 4:
Which of the following method is NOT used to detect conflicts of interest?
A. Review of vendor ownership files
B. Interviews with purchasing personnel
C. Underbillings of assets
D. Tips & Complaints
正解:C
質問 5:
One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.
正解:
Embezzling
質問 6:
Which of the following is a common red flag of a bid tailoring scheme?
A. There are unusually narrow specifications for the type of goods being procured.
B. The procuring entity's request for bid submissions provides clear bid submission information.
C. The procuring entity rebids contracts because fewer than the minimum number of bids are received.
D. Numerous bidders respond to the procuring entity's bid requests.
正解:A
質問 7:
Which of the following is a method of identity theft prevention that is recommended for businesses?
A. Audit practices involving the handling of information only when regulators require it
B. Collect government identification numbers from customers only when legally required to gather that information.
C. Use government identification numbers as employee identification numbers
D. Use encryption only when sending personal information externally through a hardwired internet connection.
正解:B
池永** -
該当の問題集だけで合格することが出来ました。
テキストの内容を1から勉強していって、模擬試験を2、3周すれば合格できると思います。
本番も余裕をもって回答できました。ありがとうございました。