5-47.
Which of the following
practices is/are suggested
for the handling of personal
data?
1.
2.
3.
4.
Label recording media
that contain data of
local personnel only
Carefully control
products of intermediate
processing steps
Maintain an online,
up-to-date hardcopy
authorization list of
all individuals who have
access to any data
Both 2 and 3 above
5-48.
Which of the following
practices is/are suggested
for the maintenance of
personal records?
1.
2.
3.
4.
Establish procedures for
maintaining correct,
current accounting of
all new personal data
brought into the
computer facility
Maintain logbooks for
terminals that are used
to access any data by
system users
Both 1 and 2 above
Log each transfer of
storage media containing
data to the computer
.
facility
5-49.
For a broader knowledge of
personal identification and
identification techniques,
you should refer to which of
the FIPS publications?
1.
FIPS PUB 31
2.
FIPS PUB 48
3.
FIPS PUB 79
4.
FIPS PUB 114
5-50.
5-51.
5-52.
4-53.
4-54.
Which of the following
pieces of equipment might be
considered a TEMPEST hazard?
1.
Personal computer
2.
Electric typewriter
3.
Both 1 and 2 above
4.
A copying machine
The vulnerability of a ship
or aircraft can be
determined by which of the
following means?
1.
A TEMPEST survey
2.
A TEMPEST vulnerability
assessment
3.
A TEMPEST investigation
4.
An emission control test
What is the purpose of
EMCON?
1.
To intercept and
rebroadcast signals to
confuse hostile forces
2.
To prevent hostile
forces from detecting,
identifying, and
locating friendly forces
3.
To minimize the amount
of transmission time on
live circuits
4.
Both 2 and 3 above
What is the designation of
security spaces requiring
access control?
1.
Controlled area
2.
Exclusion area
3.
Restricted area
4.
Limited area
Which of the following
information should appear in
a visitors log for a
communications center?
1.
Visitors printed name
and signature
2.
Purpose of visit and the
escorts name
3.
Date and time of visit
4.
Each of the above
49