Information Security Awareness

25 Questions | Attempts: 108
Please wait...
Question 1 / 26
🏆 Rank #--
Score 0/100

1. Prior to leaving for the day, employees must secure all non-public information in a manner to which it cannot be retrieved by any unauthorized party, such as in a locked drawer or locked file cabinet.

Submit
Please wait...
About This Quiz
Information Security Quizzes & Trivia

Assessment of knowledge in dealing with security of non-public information. Covers bank policies and procedures.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Physical and administrative security standards also apply to handheld devices that utilize the cellular network for communication.

Submit

3. Password login criteria for the Signature Bank Network should:

Submit

4. Financial Institutions are generally not targets for security threats or attacks.

Submit

5. If you recognize there has been a breach of non-public information, you should:

Submit

6. Which of the following may be viewed as potential threats to technology.

Submit

7. Which of the following is true for all email use at Signature Bank?

Submit

8. Employee should write down their passwords and store them:

Submit

9. Text messaging and instant messaging are a secure way to communicate non-public information.

Submit

10. Encryption must be used when electronically storing or transmitting information that is non-public.

Submit

11. Identify the appropriate response to an email request for specific account information.

Submit

12. The _____ is/are responsible for the security of non-public information in financial institutions.

Submit

13. Per the Fair Credit Reporting Act,the bank must allow its' customers the right to opt-out of their information being shared with unaffiliated parties.

Submit

14. Non-public information is defined as:

Submit

15. It is acceptable to click on hyperlinks within the body of emails as long as you know who it came from.

Submit

16. Credit information may be given over the phone if the customer gives written consent.

Submit

17. "Pretext Calling" is a type of social engineering defined as:

Submit

18. It is the employees responsibility to investigate any breach of non-public information.

Submit

19. Employees responsibility for information security include:
(IMPORTANT-You may select more than one option)

Submit

20. Signature Bank's standard procedures for discarding documents with confidential information include the following:

Submit

21. Which of the following may be used to identify a caller as the account holder when disclosing account information?

Submit

22. Removable electronic media, such as thumb drives, are an essential part of business and therefore acceptable to use at Signature Bank as long as the information is encrypted.

Submit

23. The _____ states, there must be a policy in place to protect non-public information from foreseeable threats in security and data integrity.

Submit

24. A privacy notice is only given at the time the consumer relationship is established and must explain how their information is collected, shared and used.

Explanation

Privacy notices are also given to consumers annually. The notice must also explain how their information is protected.

Submit

25. Access to dormant accounts is strictly limited to _________.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Prior to leaving for the day, employees must secure all non-public...
Physical and administrative security standards also apply to handheld...
Password login criteria for the Signature Bank Network should:
Financial Institutions are generally not targets for security threats...
If you recognize there has been a breach of non-public information,...
Which of the following may be viewed as potential threats to...
Which of the following is true for all email use at Signature Bank?
Employee should write down their passwords and store them:
Text messaging and instant messaging are a secure way to...
Encryption must be used when electronically storing or transmitting...
Identify the appropriate response to an email request for specific...
The _____ is/are responsible for the security of non-public...
Per the Fair Credit Reporting Act,the bank must allow its' customers...
Non-public information is defined as:
It is acceptable to click on hyperlinks within the body of emails as...
Credit information may be given over the phone if the customer gives...
"Pretext Calling" is a type of social engineering defined as:
It is the employees responsibility to investigate any breach of...
Employees responsibility for information security include:...
Signature Bank's standard procedures for discarding documents with...
Which of the following may be used to identify a caller as the account...
Removable electronic media, such as thumb drives, are an essential...
The _____ states, there must be a policy in place to protect...
A privacy notice is only given at the time the consumer relationship...
Access to dormant accounts is strictly limited to _________.
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!