Information Security Assessment Quiz! Trivia

15 Questions | Total Attempts: 259

SettingsSettingsSettings
Information Security Assessment Quiz! Trivia - Quiz

What do you know about the information security assessment? Do you think you can pass this quiz? Information security is the method of safeguarding information by diminishing information risks. It is a part of data risk management. It habitually involves preventing or at least reducing the possibility of unauthorized or inappropriate access to information. There are many important variables involved in this subject. Take this quiz and see how much you know about information security assessment.


Questions and Answers
  • 1. 
    The responsibility of information security lies with the
    • A. 

      Chief Information Officer

    • B. 

      Board of Directors

    • C. 

      All Employees

    • D. 

      Managing Director

    • E. 

      Chief Risk Officer

  • 2. 
    Compliance with the Information Security Policy of the Bank is 
    • A. 

      Mandatory

    • B. 

      Optional

    • C. 

      Discretionary

  • 3. 
    The following are threats to Information Security except:
    • A. 

      Exposure to Sensitive Documentation

    • B. 

      Virus Attacks

    • C. 

      Lack of adequate personnel

    • D. 

      Natural Disasters

    • E. 

      Theft, Sabotage and Misuse

  • 4. 
    Users may install personal software on their official workstations.
    • A. 

      True

    • B. 

      False

  • 5. 
    Approval for the Introduction and removal of information assets from the premises is granted by 
    • A. 

      Chief Information Officer

    • B. 

      Head, Corporate Services

    • C. 

      Both

  • 6. 
    Users shall carry items such as laptops as hand luggage while in transit when they deem it necessary.
    • A. 

      True

    • B. 

      False

  • 7. 
    Users are expected to keep a clear desk at the last working day of the week alone.
    • A. 

      True

    • B. 

      False

  • 8. 
    Users may write out passwords for safe keeping.
    • A. 

      True

    • B. 

      False

  • 9. 
    Sharing of user IDs or passwords is permitted with adequate justification.
    • A. 

      True

    • B. 

      False

  • 10. 
    Malware incidents shall be reported and resolved in line with SunTrust Bank Incident Management Procedures.
    • A. 

      True

    • B. 

      False

  • 11. 
    Any SunTrust Bank information stored in removable media for any particular purpose shall be deleted once no longer required.
    • A. 

      True

    • B. 

      False

  • 12. 
    The use of third party email services for official purposes may be permitted discretionarily.
    • A. 

      True

    • B. 

      False

  • 13. 
    Users shall make an attempt to nullify potential threats to their systems in addition to consulting the IT Department.
    • A. 

      True

    • B. 

      False

  • 14. 
    Users shall report issued devices lost or stolen immediately to the CIO in accordance with the information security incident management process
    • A. 

      True

    • B. 

      False

  • 15. 
    Users shall pro-actively explore the use of other communication links such as personal modems to connect to the Bank's internal network should there be downtime from the Bank's internet service providers.
    • A. 

      True

    • B. 

      False

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.