Computer Security
Computer Security
you do?
Oa. Exploit the security loophole to try and find out the Correct Answer
confidential information about other Infoscions Whenever you come across
a security weakness on an
Ob. Post the details on an online hacking forum to get
how to best exploit the vulnerability.
Infosys system/network,
help on
it
you should report
Oc. Post it in Infosys Yammer to warn fellow Infoscions immediately on the
from using the application Security Incident Portal
(Sparsh->Units at Infosys
Od. Report it to ISG via AHD (Advanced Helpdesk)/global
helpdesk/email >informationSecurity
Group->Report à Security
Incident) so that actions
3. Which of the following passwords meets Infosys password
requirements and would also be easy to remember?
Oa. You will refuse to share the password and assure your Incorrect Answer
manager that you can be reached over a call to obtain
Passwords should not be
the credentials in case of any urgent deliverables
shared with anyone under
Ob. You ill inform your manager that this will amount to any circumstances, even
a violation. Alternatively, client approval can be with the intention of
obtained for creation of an alternate user ID with similar meeting a deadline.
privileges for another team member to ensure Sharing passwords and
continuity of deliverables compelling others to do so,
is a serious violation of
Oc. You will not share your credentials with anyone under
policy that can result in
5. Youaccidentally find appraisal information of your team
mate In the project shared folder. What would you do?
Oa. You probe further to see how your team mate has Incorrect Answer
been rated
Though the appraisal data
Ob. You take a screenshot of the data and email it to your is in a shared folder, itis
team mate to confirm if this is really his rating confidential and not a
public information. Bring it
Oc. Log an AHD (Advanced Help Desk) request with cCD to the notice of your
(Computers and Communication Division) to rectify the manager immediately for
issue rectification.
Od. You delete the data to ensure it is not misused
Oe. You promptly notify your manager about this
unwarranted access to ensure timely remediation of the
issue
Ob. Yes, only if you are a JL7 and above Downloading of software's
from the Internet could
Oc. No, since this could lead to downloading of malware. result in malware infection
Instead you can check an alternative utility in the and propagation within the
software house or raisea request in Software Security company network.
Validation Portal (SSVP) portal for a manager approved Software's must be
exception. downloaded from the
Od. Yes, as you plan to only use for the trial period authorized software's
available in the in house
Software Center. Further,
7. During aclient audit, the external auditor seeks for your
credentials. What would be your response?
Oa. Worm -
Self replicating and independent malware; Correct Answer
Virus - Tracks user activities and steals information; A computer worm is a
Trojan- Automatically displays advertisements; and standalone malware
Ransomware- Needs user to launch the file computer program that
Ob. Worm - Self replicating and independent malware; replicates itself in orderto
spread to other computers.
Virus- Needs user to launch the file; Trojan Disguises
A computer virus is a type
as a useful program to trick users to download malware;
10. What is the most suitable MS Azure Information
Protection (AIP) label whille sharing a presentation with
dient names and future project detalls with your
Manager?
Oa. Use AlP (Azure Information Protection) label Correct Answer
Confidential'and select appropriate permissions by MS Azure Information
opting for a suitable sub level Protection (AIP) is the tool
Ob. UseAlIP (Azure Information Protection) label used to classify the
Internal'and select ap ropriate permissions by opting information dependingon
for a suitable sub level
the sensitivity of the
information. AIP has four