These are the 25 sets of Security quizzes – Generic Question and Answer. Here, the content that we are providing is based on our knowledge and personal study. Show 1.)What are the different information classification categories available in the company? Answer.) C 2.)It is always acceptable to send business information from your customer-provided email id to your email id. Is this statement True or False? Answer.) B 3.)You are using the same password for an application for a long time. Is
the use of the same password for a long time advisable? Answer.) A 4.)You are working overseas at a client
location and need to use the data when you return to your home country. How will you ensure data availability? Answer:) D 5.)You have prepared a Design Document for the new product being launched by your customer. The customer has not provided any guidance on how such documents should be classified. How will you handle the document? Answer.) A 6.)You are
executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do? Answer.) B 7.)When you have to retain the information, which factors should be considered for the retention period? Answer.) All of the above 8.)Which of the following statements is/are correct while using the
Internet/intranet/Network Channels provided by the company? Answer.) B and C 9.)Writing down passwords is wrong. With respect to this statement which of the following options are
appropriate? Answer.) D 10.)What is referred to as social engineering? Answer.) C 11.)If you find a person whom
you know tailgating what should you do? Answer.) A and C 12.)What should you do to make your password difficult to guess or crack? Answer.) A and C 13.)One day when you log on to your e-mail, you find that there is an unsolicited e-mail having abusive and offensive content in your inbox. What should you
do? Answer.) B 14.)Rakesh has been deputed to a client located in the US. The client has provided a laptop to Rakesh. His family
resides in India. Every evening he uses the client-provided laptop to chat with his family through a webcam using software he has installed directly from the internet. Which of the following is correct? Answer.) C 15.)You were creating some design/flow diagrams on paper for a sensitive project of a client. when suddenly the PL calls you for an urgent meeting in a meeting room which is outside the Offshore Development Center (ODC). What is the appropriate way to
handle the papers? Answer.) B 16.)You are working on a project and require logging on to the environment managed by the client The client has provided you with a single user ID and your entire team uses the same ID to login to the environment. Which of these statements is correct in this context Answer.) C 17.)You have backed up your project information on media. The project will continue for the next two years.
How often should the restorability test be done? Answer.) C 18.)Which of the following is not true about Information classified as Private and
confidential? Answer.) A and C 19.)YOU are searching the Internet for some Information. After clicking a link on one page you become suspicious that it may have triggered a virus or something which is wrong. What should be
your immediate reaction? Answer.) A and D 20.)You are executing a project and you have
come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do? Answer.) B 21.)Which of the following is most appropriate with regard to an organization’s Business Continuity Planning (BCP) framework? Answer.) C 22.)The TCS recommended method of disposing of non-electronic Information in paper form classified as Restricted, Confidential, or Private & Confidential is the same. Is this statement True or False? Answer.) A 23.)How
should an Information Security Incident be reported? Answer.) A 24.)You find that your webmail ID is compromised. What could be the possible reasons? Answer.) A and C 25.)You are the owner of the information and you have to share it with the client. For some reason, It is
not possible to label the information. What should you do while sharing the information? Answer.) C 26.)Which of the following choices should be covered while preparing the information backup schedule? Answer.) All of the above. security quizzes isecurity security quiz security quizzes isecurity security quiz security quizzes isecurity security quiz security quiz security quiz security quiz security quiz security quiz security quiz security quiz, security quiz security quiz security quiz Which of the following is most appropriate with regard to BCP framework?The organisation should carry out cost benefits analysis with due diligence .
How does BCP benefit an organisation Mcq?An Organization requires a Business Continuity Plan (BCP) to ensure the uninterrupted availability of all key business resources required to support essential business functions.
What is a BCP framework?Business Continuity Plan (BCP) framework is procedural guidance to create plans that prevent, prepare, respond, manage, and recover a business from any disruption. Many organizations have not realized that BCP is essential to their business continuity.
Why does TCS Mcq need business continuity plan?Business continuity policy and planning are fundamental to ensure against organisational and reputation risk in case of business interruption.
|