0% found this document useful (0 votes)
45 views5 pages

ISecurity Quiz All 75 Questions

Uploaded by

Mallikarjun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views5 pages

ISecurity Quiz All 75 Questions

Uploaded by

Mallikarjun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

iSecurity Quiz - All 75 Questions and Answers

1. Q: What are the different information classification categories available in the company?
A: C. Restricted, Confidential, Internal Use, Public-Private and Confidential

2. Q: It is always acceptable to send business information from your customer-provided email ID to your email ID.
A: B. FALSE

3. Q: Is the use of the same password for a long time advisable?


A: A. No as use of the same password makes it vulnerable to breach over a period of time

4. Q: How will you ensure data availability when returning to your home country from a client location?
A: D. Carry the data with you with client permission

5. Q: How to handle a Design Document with no customer classification guidance?


A: A. At par with Confidential classification

6. Q: What to do when information needs to be retained beyond project duration?


A: B. Communicate to the customer with reason

7. Q: Factors to consider for information retention period?


A: All of the above (TC Retention policy, Regulatory requirements, Project duration, Contractual requirements)

8. Q: Which statements are correct while using company Internet/intranet/network?


A: B and C

9. Q: Writing down passwords is wrong. Why?


A: D. Writing down passwords will disclose it to unauthorized people

10. Q: What is social engineering?


A: C. Using people skills to obtain proprietary/confidential information

11. Q: If you see tailgating, what should you do?


A: A and C

12. Q: How to make your password hard to crack?


A: A and B

13. Q: What to do with abusive/unwanted emails?


A: B. Report and delete with evidence

14. Q: Can Rakesh use client laptop for personal use?


A: C. The client-provided laptop must be used for business purposes only

15. Q: How to handle confidential papers before leaving desk?


A: B. Lock in desk drawer

16. Q: Is it acceptable to share a single user ID provided by client?


A: C. Credentials should never be shared

17. Q: How often should backup restorability test be done?


A: C. Should be done regularly
18. Q: Which is not true about Private and Confidential info?
A: A and C

19. Q: What to do if you suspect virus activity after clicking a link?


A: A and D

20. Q: What to do if retention exceeds project duration due to regulations?


A: B. Communicate to the customer

21. Q: Best approach for Business Continuity Planning (BCP)?


A: C. Do cost-benefit analysis and implement as per business objectives

22. Q: Is disposal method same for all classified paper info?


A: A. TRUE

23. Q: How to handle classified info while traveling?


A: C. Store in secure bag or locked compartment

24. Q: What to do if a friend shares their password?


A: B. Inform and advise to change

25. Q: When is confidentiality compromised?


A: B. Disclosure to unauthorized individuals

26. Q: You find someone tailgating behind you at the door. What should you do?
A: A and C

27. Q: What is the best way to make a password hard to guess?


A: A and B

28. Q: What action is appropriate for abusive or unwanted emails?


A: B. Report and delete with evidence

29. Q: Is it acceptable to use client-provided laptop for personal use?


A: C. Must be used for business purposes only

30. Q: Before leaving your desk, how should you handle confidential documents?
A: B. Lock in desk drawer

31. Q: Should you share credentials provided by a client?


A: C. Credentials should never be shared

32. Q: How frequently should backup restorability be tested?


A: C. Should be done regularly

33. Q: Which statements are NOT true about Private and Confidential info?
A: A and C

34. Q: What to do after clicking a suspicious link with potential virus activity?
A: A and D

35. Q: Retention exceeding project duration due to regulations should be handled by?
A: B. Communicate to the customer
36. Q: Business Continuity Planning (BCP) is best approached by?
A: C. Cost-benefit analysis with business objectives

37. Q: Is the disposal method same for all classified paper information?
A: A. TRUE

38. Q: How should classified information be carried while travelling?


A: C. Store in secure bag or locked compartment

39. Q: What should you do if someone shares their password with you?
A: B. Inform and advise to change

40. Q: Confidentiality is compromised when?


A: B. Disclosure to unauthorized individuals

41. Q: Where should incidents be reported?


A: D. Incident Management System

42. Q: When receiving an unknown USB from a client, you should?


A: All of the above

43. Q: Where can you find information on security incidents?


A: A. Company Wiki

44. Q: When can a password be shared?


A: D. Never

45. Q: Who is responsible for information security?


A: All employees

46. Q: To whom do you report a suspicious incident?


A: A. Information Security Manager

47. Q: For what purpose can personal email be used on company systems?
A: D. Should never be used for business

48. Q: Why are pirated music files not allowed on company devices?
A: C. It is a copyright violation

49. Q: When taking printouts, what is a good practice?


A: A and B

50. Q: Can you forward miracle chain mails from your office email?
A: B and D

51. Q: Where classification is not specified by the client, such information does not require any specific protection.
A: B. FALSE

52. Q: You receive a miracle email on official mail ID. What should you do?
A: B and D

53. Q: You are not allowed to classify any information as Public without authorization.
A: A. TRUE
54. Q: Rohit is asked for laptop verification while leaving. What should he do?
A: C

55. Q: Working overseas, how will you ensure data availability back home?
A: D

56. Q: Unrest reported in city, what should you do?


A: D

57. Q: Precautions while printing debug code?


A: A, B, and D

58. Q: Why can't unlicensed music files be stored?


A: C

59. Q: Client gives USB with data. What to do?


A: All of the above

60. Q: As DB admin, can you share your password?


A: D

61. Q: What to do with abusive, unsolicited email?


A: B

62. Q: Fire alarm rings during client call. What to do?


A: B

63. Q: What data should be selected for backup?


A: D

64. Q: Supervisor asks for login while you're on leave. What to do?
A: C and D

65. Q: Working from home: What to check when connecting to network?


A: A, B, and C

66. Q: Should encrypted email attachments be virus checked?


A: A. TRUE

67. Q: Where is the Business Continuity process defined?


A: A

68. Q: Need to use unapproved chat app. What to do?


A: B

69. Q: Can you use code from friend for email auto-response?
A: B

70. Q: New user finds personal files on desktop. What should they do?
A: D

71. Q: Received personal business proposal on company email?


A: B and D
72. Q: Factors for info retention?
A: All of the above

73. Q: Bank email asking to verify online activities?


A: A

74. Q: Whom to contact for information security concerns?


A: A

75. Q: Top official visitor: how to handle access?


A: D

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy