Вы находитесь на странице: 1из 6

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text
Information Security is preservation of
Select one:
a. Confidentiality, Integrity, Authenticity
b. Constitution, Integrity, Authenticity
c. Confidentiality, Integrity, Availability
d. Confidentiality, International, Availability

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text
What are the cons of non-compliance to information security policy?
Select one:
a. Direct financial loss
b. IT downtime, business interruption
c. Breaking laws and regulations, leading to prosecutions, fines and penalties
d. All of the above

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text
Information security policy of Nagarro states
1. Nagarro is committed to maintaining confidentiality, integrity and availability of the
information and data pertaining to employees and customers. This shall be achieved by
complying with applicable legal, statutory and regulatory policies including our
documented information security management system (ISMS).
2. Nagarro is committed to maintaining client and employee satisfaction by complying with
applicable legal, statutory and regulatory policies.
3. Nagarro shall follow a Risk Assessment approach to assess and manage information
security risks in performing custom software development and activities of support
functions where risk value is based on asset value, threat value and vulnerability value.
4. Nagarro is committed to bring awareness and make ISMS accessible to all employees
Select one:
a. 1 and 2
b. 1, 2 and 3
c. 1, 3 and 4
d. 3 and 4

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text

How to safeguard yourself from malware?


Select one:
a. Use antivirus software to protect your PC/laptop/handheld device.
b. Do not open or download any file or attachment or website links received via SMS or email from
unknown resources.
c. Use licensed operating systems, software and browsers in your device.
d. All of the above

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text
Best practices to safeguard from online scam
Select one:
a. Emails address should be communicated as abcd[dot]xyz[at]nagarro[dot]com
b. Email attachments containing confidential data should be password protected using
Winzip/7zip.
c. Do not enter personal / financial information (such as login id, password) on sites without the
security padlock.
d. All of the above

Question

Complete
Mark 1.00 out of 1.00

Flag question

Question text
Employees are required to escort the visitors by themselves at all times
Select one:
a. True
b. False

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text
ERT Stands for?
Select one:
a. Energetic Team
b. Emerging Resource Team
c. Emergency Response Team
d. Emergency Resourcing Team

Question

Complete
Mark 1.00 out of 1.00

Flag question

Question text
In case of earthquake
1.
2.
3.
4.

Follow the DCH (Drop, Cover and Hold) technique


Evacuate immediately
Start the evacuation process if instructed by ERT team
Use the fire extinguishers available at each floor

Select one:
a. 1 and 3
b. 2
c. 1, 3 and 4
d. 1 and 4

Question

Complete
Mark 1.00 out of 1.00
Flag question

Question text
What to do in case of fire?
Select one:
a. Raise alarm by shouting -> Evacuate the building -> Move to designated safe area

b. Raise alarm by pressing the MCP (Manual Call Point) -> Raise alarm by shouting -> Evacuate the
building -> Move to designated safe area
c. Raise alarm by pressing the MCP (Manual Call Point) -> Evacuate the building and move to any
area outside the building
d. Raise alarm by pressing the MCP (Manual Call Point) -> In case of Minor / low intensity fire use
the fire extinguishers available at each floor -> Start the evacuation process if instructed by ERT
Floor Member(s) and/or Building Coordinator(s) -> Move to designated safe area
Question

10

Complete
Mark 1.00 out of 1.00
Flag question

Question text
Clear desk policy statesSelect one:
a. Store paper in cabinets. If not required, tear it or use shredder
b. Confidential documents should always be in lock unless until required
c. Clean white boards once used
d. All of these

Вам также может понравиться