Вы находитесь на странице: 1из 14

18/01/2019 Assessment

Dashboard / My courses / H2 ISMS/BCMS Assessment & Awareness Program


/ H2 ISMS/BCMS Assessment & Awareness Program / Assessment

Started on Friday, 18 January 2019, 2:53 PM


State Finished
Completed on Friday, 18 January 2019, 3:19 PM
Time taken 25 mins 12 secs
Marks 25.00/25.00
Grade 10.00 out of 10.00 (100%)
Feedback Congrats !!! You have Passed !!

Question 1

Correct

Mark 1.00 out of 1.00

Which of the following is not a password guideline?

Select one:
a. You must change your password whenever there is any indication of possible system
or password compromise.

b. You must use passwords in an automated log-on process whenever possible to keep
the password from being intercepted while entering the password.

c. Your password must have an eight-character minimum length.

d. You must keep passwords confidential and avoid keeping a paper record of
passwords,
unless this can be stored securely.

Your answer is correct.

The correct answer is: You must use passwords in an automated log-on process whenever
possible to keep the password from being intercepted while entering the password.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 1/14
18/01/2019 Assessment

Question 2

Correct

Mark 1.00 out of 1.00

Clear screen means that computers are to remain locked when you move away from your desk.
Clear Desk means that confidential documents are to be under lock & key and should not be
accessible to unauthorized parties when you move from your desk. These statements are

Select one:
True 

False

The correct answer is 'True'.

Question 3

Correct

Mark 1.00 out of 1.00

Which of the following is a good practice to avoid email viruses?

Select one:
a. Delete an unexpected or unsolicited message

b. Use anti-virus software to scan attachments before opening

c. Do not Register CSS email account in any external mailing list for receipt

d. All the above


Your answer is correct.


The correct answer is: All the above

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 2/14
18/01/2019 Assessment

Question 4

Correct

Mark 1.00 out of 1.00

What are your responsibilities for the protection of company assets

Select one:
a. Assist with the protection and proper use of information assets

b. Know the processes to protect information assets

c. Build proper security practices into your day

d. All of the above


Your answer is correct.

The correct answer is: All of the above

Question 5

Correct

Mark 1.00 out of 1.00

Trojan horses are software programs that hide their true purpose, and reveal their designed
behaviour only when activated.

Select one:
True 

False

The correct answer is 'True'.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 3/14
18/01/2019 Assessment

Question 6

Correct

Mark 1.00 out of 1.00

What can I do to reduce potential security threats?

Select one:
a. Do not share my password

b. Turn off a computer's virus software

c. Log out when I step away from my computer

d. All of the above

e. A and C

Your answer is correct.


The correct answer is: A and C

Question 7

Correct

Mark 1.00 out of 1.00

What method(s) can be used to protect sensitive data from prying eyes?

Select one:
a. Passwords

b. File Permissions

c. Encryption

d. All of the above


Your answer is correct.

The correct answer is: All of the above

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 4/14
18/01/2019 Assessment

Question 8

Correct

Mark 1.00 out of 1.00

Which of the following is a good practice when handling user accounts and passwords?

Select one:
a. Sharing your password with the IT department when they need it to fix a problem

b.
Using the "Remember Password" feature

c. Using a different password for Company and non-Company accounts



d. Saving your password in an unencrypted document

Your answer is correct.

The correct answer is: Using a different password for Company and non-Company accounts

Question 9

Correct

Mark 1.00 out of 1.00

What are your responsibilities for the protection of company assets?

Select one:
a. Assist with the protection and proper use of information assets

b. Know the processes to protect information assets

c. Build proper security practices into your day

d. All of the above


Your answer is correct.


The correct answer is: All of the above

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 5/14
18/01/2019 Assessment

Question 10

Correct

Mark 1.00 out of 1.00

Which of the following message attachments would you be wise not to open? A message with
an attachment that:

Select one:
a. Appears more than once in your Inbox

b. Says it's a sample copy of a new game from a recognized company e-mail address

c. Is an unexpected note from a friend

d. All of the above


Your answer is correct.


The correct answer is: All of the above

Question 11

Correct

Mark 1.00 out of 1.00

Instant Messaging is safer than regular email.

Select one:
True

False 

The correct answer is 'False'.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 6/14
18/01/2019 Assessment

Question 12

Correct

Mark 1.00 out of 1.00

If you're not careful about your Internet browsing, which of the following can be the result?

Select one:
a. Spyware

b. Viruses

c. Hacking

d. All of the above


Your answer is correct.


The correct answer is: All of the above

Question 13

Correct

Mark 1.00 out of 1.00

What is a Trojan?

Select one:
a. A descendant of the legendary city of Troy

b. Computer code designed to allow a hacker remote control of a user's system



c. Brad Pitt

d. The famed Trojan horse that caused the fall of Troy

Your answer is correct.


The correct answer is: Computer code designed to allow a hacker remote control of a user's
system

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 7/14
18/01/2019 Assessment

Question 14

Correct

Mark 1.00 out of 1.00

What is the most common delivery method for viruses?

Select one:
a. Email

b. Instant Message

c. Internet download

d. All the Above


Your answer is correct.


The correct answer is: All the Above

Question 15

Correct

Mark 1.00 out of 1.00

What is PII?

Select one:
a. Personally Identifiable Information

b. Personality Identification of Individual

c. Professional indemnity insurance

d. None of the above

Your answer is correct.


The correct answer is: Personally Identifiable Information

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 8/14
18/01/2019 Assessment

Question 16

Correct

Mark 1.00 out of 1.00

What are the Three Components of Title II which is most often associated with HIPAA
Compliance

Select one:
a. Privacy, Integrity, Security

b. Privacy, Standardization of electronic patient health, confidentiality

c. Privacy, Security, Standardization of electronic patient health


Your answer is correct.


The correct answer is: Privacy, Security, Standardization of electronic patient health

Question 17

Correct

Mark 1.00 out of 1.00

Downloading unauthorised content, attachments, pictures, music, movies etc is a security


breach as per our internet usage policy

Select one:
True 

False

The correct answer is 'True'.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 9/14
18/01/2019 Assessment

Question 18

Correct

Mark 1.00 out of 1.00

The overall process regarding risk assessment is identification, analysis and evaluation. What is
mandatory?

Select one:
a. A document called Risk Assessment Report

b. Risk assessment policy document

c. Risk assessment sheets or information collected through risk assessment tool


Your answer is correct.

The correct answer is: Risk assessment sheets or information collected through risk
assessment tool

Question 19

Correct

Mark 1.00 out of 1.00

An old college buddy would like to send you pics of his trip to Cancun, what should you do?

Select one:
a. Give him your personal e-mail account

b. Tell him your not interested

c. Give him your work e-mail account

d. Have him upload it to your company's FTP site for retrieval at a later date

Your answer is correct.


The correct answer is: Give him your personal e-mail account

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 10/14
18/01/2019 Assessment

Question 20

Correct

Mark 1.00 out of 1.00

If you're not careful about your Internet browsing, which of the following can result?

Select one:
a. Spyware or Adware installation

b. Browser Hijacking

c. Information or identity theft

d. All of the above


Your answer is correct.


The correct answer is: All of the above

Question 21

Correct

Mark 1.00 out of 1.00

What is/are the general cause(s) of unethical and illegal behaviour?

Select one:
a. Accident

b. Intent

c. Ignorance

d. All of the above


Your answer is correct.


The correct answer is: All of the above

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 11/14
18/01/2019 Assessment

Question 22

Correct

Mark 1.00 out of 1.00

What is PCI DSS?

Select one:
a. A type of bank account that allows businesses to process credit card payments

b. A set of requirements established by the major credit card brands to protect


consumers, merchants and service providers from theft, fraud and other security threats
stemming from credit card transactions

c. A standard created by the FBI to ensure that the major credit card brands are protected
from merchant error and misuse

Your answer is correct.


The correct answer is: A set of requirements established by the major credit card brands to
protect consumers, merchants and service providers from theft, fraud and other security threats
stemming from credit card transactions

Question 23

Correct

Mark 1.00 out of 1.00

It's OK to put your company e-mail address on a Web site.

Select one:
True

False 

The correct answer is 'False'.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 12/14
18/01/2019 Assessment

Question 24

Correct

Mark 1.00 out of 1.00

Who is Data Controller?

Select one:
a. Any freely given, specific, informed and unambiguous indication of the data subject's
wishes by which he or she, by a statement or by a clear affirmative action, signifies
agreement to the processing of his/ her personal data

b. Organization that determines the purposes and means for processing personal data

c. Organization that processes personal data on behalf of and in accordance with the
instructions of the controller (for example CSS Corp processes personal information on
behalf of its clients.)

Your answer is correct.


The correct answer is: Organization that determines the purposes and means for processing
personal data

Question 25

Correct

Mark 1.00 out of 1.00

If you are installing new software for your department, which of the following is not required?

Select one:
a. Following the password security requirements detailed in the Information Security
Policy

b. Notifying the IT dept. about any backup and recovery procedures that are required or
are provided by the vendor

c. Performing an annual review of access to ensure terminated employees have been


removed
d. Notifying the IT department about the system and who will be its administrator

Your answer is correct.


The correct answer is: Performing an annual review of access to ensure terminated employees
have been removed

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 13/14
18/01/2019 Assessment

◄ Presentation Jump to...

https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 14/14