Ultimate Software Security Overview Quiz

10 Questions

Settings
Please wait...
Ultimate Software Security Overview Quiz

This quiz will measure your knowledge of Information Security at Ultimate Software. Before completing this quiz, make sure you have completed 9600 Ultimate Software Security Overview.


Questions and Answers
  • 1. 
    What are the essential elements of Information Security? Select all that apply.
    • A. 

      Confidentiality

    • B. 

      Policies

    • C. 

      Availability

    • D. 

      Integrity

  • 2. 
    What policies does the Employee Handbook cover?
    • A. 

      Ultimate Software’s and your responsibilities when working with any personal information

    • B. 

      A variety of policies such as Acceptable Use of Company Assets, VPN, and Acceptable Encryption

    • C. 

      Company policies including phone/e-mail guidelines and branding/copyright

  • 3. 
    Information Security is the policies, procedures, and practices required to maintain and provide assurance of the confidentiality, integrity, and availability of information.
    • A. 

      True

    • B. 

      False

  • 4. 
    Which of the following documents are classified 'confidential'? Select all that apply.
    • A. 

      The Employee Handbook

    • B. 

      Organizational Charts

    • C. 

      Sales Contracts

    • D. 

      Company Web site

  • 5. 
    Select the example that illustrates a strong password.
    • A. 

      021492

    • B. 

      Hello2U!

    • C. 

      Tp4tci2s4U2g!

    • D. 

      J0hn435

  • 6. 
    Which of the following items should be shredded prior to discarding? Select all that apply.
    • A. 

      Ultimate Software CDs/DVDs

    • B. 

      Training Materials

    • C. 

      Network Diagrams

    • D. 

      Organizational Charts

  • 7. 
    Ultimate Software's Privacy Policy _______________.
    • A. 

      Includes a variety of policies such as Acceptable Use of Company Assets, VPN, and Acceptable Encryption

    • B. 

      Outlines Ultimate Software’s and your responsibilities when working with any personal information

    • C. 

      Provides assurance that the systems responsible for delivering, storing, and processing information are accessible when they are needed

  • 8. 
    Confidentiality is one component of Information Security. Confidentiality __________.
    • A. 

      Provides assurance that the systems responsible for delivering, storing, and processing information are accessible when they are needed

    • B. 

      Provides assurance that information is accessed by and shared only by those who are authorized

    • C. 

      Provides assurance that the information accessed is trustworthy and reliable

  • 9. 
    Integrity, a component of Information Security, provides assurance that the systems responsible for delivering, storing, and processing information are accessible when they are needed.
    • A. 

      True

    • B. 

      False

  • 10. 
    • A. 

      Never disable the antivirus application that comes with your laptop.

    • B. 

      Create passwords using letters and numbers.

    • C. 

      Scan e-mail attachments for viruses before opening them.

    • D. 

      If you suspect you have a computer virus, restart your computer.

    • E. 

      Do not store confidential information in a USB drive.