Академический Документы
Профессиональный Документы
Культура Документы
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information Security is preservation of
Select one:
a. Confidentiality, Integrity, Authenticity
b. Constitution, Integrity, Authenticity
c. Confidentiality, Integrity, Availability
d. Confidentiality, International, Availability
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What are the cons of non-compliance to information security policy?
Select one:
a. Direct financial loss
b. IT downtime, business interruption
c. Breaking laws and regulations, leading to prosecutions, fines and penalties
d. All of the above
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information security policy of Nagarro states
1. Nagarro is committed to maintaining confidentiality, integrity and availability of the
information and data pertaining to employees and customers. This shall be achieved by
complying with applicable legal, statutory and regulatory policies including our
documented information security management system (ISMS).
2. Nagarro is committed to maintaining client and employee satisfaction by complying with
applicable legal, statutory and regulatory policies.
3. Nagarro shall follow a Risk Assessment approach to assess and manage information
security risks in performing custom software development and activities of support
functions where risk value is based on asset value, threat value and vulnerability value.
4. Nagarro is committed to bring awareness and make ISMS accessible to all employees
Select one:
a. 1 and 2
b. 1, 2 and 3
c. 1, 3 and 4
d. 3 and 4
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Best practices to safeguard from online scam
Select one:
a. Emails address should be communicated as abcd[dot]xyz[at]nagarro[dot]com
b. Email attachments containing confidential data should be password protected using
Winzip/7zip.
c. Do not enter personal / financial information (such as login id, password) on sites without the
security padlock.
d. All of the above
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Employees are required to escort the visitors by themselves at all times
Select one:
a. True
b. False
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
ERT Stands for?
Select one:
a. Energetic Team
b. Emerging Resource Team
c. Emergency Response Team
d. Emergency Resourcing Team
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In case of earthquake
1.
2.
3.
4.
Select one:
a. 1 and 3
b. 2
c. 1, 3 and 4
d. 1 and 4
Question
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What to do in case of fire?
Select one:
a. Raise alarm by shouting -> Evacuate the building -> Move to designated safe area
b. Raise alarm by pressing the MCP (Manual Call Point) -> Raise alarm by shouting -> Evacuate the
building -> Move to designated safe area
c. Raise alarm by pressing the MCP (Manual Call Point) -> Evacuate the building and move to any
area outside the building
d. Raise alarm by pressing the MCP (Manual Call Point) -> In case of Minor / low intensity fire use
the fire extinguishers available at each floor -> Start the evacuation process if instructed by ERT
Floor Member(s) and/or Building Coordinator(s) -> Move to designated safe area
Question
10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Clear desk policy statesSelect one:
a. Store paper in cabinets. If not required, tear it or use shredder
b. Confidential documents should always be in lock unless until required
c. Clean white boards once used
d. All of these