This free survey is powered by
0%
Questions marked with a * are required Exit Survey
 
 
*

The financial result of your company is published in the website. The document is to be classified as


 
A. Confidential Document
 
B. Public Document
 
C. Internal Document
 
D. External Document
 
 
 

Clear screen means that computers are to remain locked when you move away from your desk
Clear Desk means that confidential documents are to be under lock & key and should not be accessible to unauthorized parties when you move from your desk. 
These statements are

 
A. Correct
 
B. Incorrect
 
 
 

CEO sends a  mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as


 
A. Internal Mail
 
B. Public Mail
 
C. Confidential Mail
 
D. Restricted Mail
 
 
 

A vulnerability means an inherent weakness in the system.


How have we reduced the vulnerability of outside attack to our network?
 
A. By using Firewalls
 
B. By installing a router
 
C. Using MS Outlook
 
D. Using CVS
 
 
 

CIA of assets stands for?


 
A. Confidentiality, Integration and Availability
 
B. Continuity, Integration and Availability
 
C. Confidentiality, Integrity and Accessibility
 
D. Continuity, Integrity and Accessibility
 
E. Confidentiality, Integrity and Availability
 
 
 

6.What is the difference between a restricted and confidential document?


 
A. Restricted - to be shared among an authorized group Confidential - to be shared among named individuals
 
B. Restricted - to be shared among named individuals Confidential - to be shared among an authorized group
 
C. Restricted - to be shared among named individuals Confidential - to be shared across the organization only
 
D. Restricted - to be shared among named individuals Confidential - to be shared with friends and family
 
 
 

Why do we have a Business Continuity Plan?


 
A. To ensure availability/immediate restoration of our service to the customers in the event of a disaster/Incident
 
B. To ensure that we continue business relations with customers even after a project has ended
 
C. To ensure that customers are kept happy so that we continue to get business from them.
 
 
 

What quality system standard has been adopted for implementing the ISMS quality system?


 
A.ISO9001:2008
 
B.ISO27001:2005
 
C.ISO14001:2004
 
D.BS7799
 
E.TL9000:2000
 
 
 

What is social engineering?


 
A. A group planning for a social activity in the organization
 
B. Creating a situation wherein a third party gains confidential information from you
 
C. The organization, planning an activity for the welfare of the neighborhood
 
 
 

What is Risk?


 
A. Risk is the just a consequence
 
B. Risk is the combination of the probability of an event occurring along with its consequence
 
C. Risk is just an probability of an event happening
 
By Akhilesh Nawade