Tcs Information Security Quiz Questions And Answers

15 Questions | Total Attempts: 1717

SettingsSettingsSettings
Tcs Information Security Quiz Questions  And Answers - Quiz

Attempt these TCS information security quiz questions and answers and check your knowledge for the same. This quiz is a part of an Information Security Awareness Program. If you want to empower and enhance your understanding of cyber security, you should definitely take up this test. This group (TCS) is responsible for driving the security on both premise and cyber. To learn more about information security practices, try the below quiz. Best of luck, buddy!


Questions and Answers
  • 1. 
    Information Security is the responsibility of
    • A. 

      Information Services

    • B. 

      All employees

    • C. 

      Key employees handling sensitive or criminal justice data

    • D. 

      All of the above

    • E. 

      None of the above

  • 2. 
    The 90% / 10% rule states
    • A. 

      90% of information security is technical and 10% is good user practice.

    • B. 

      90% of security threats are avoidable and 10% are not

    • C. 

      10% of information secuirty is technical and 90% is good user practice.

    • D. 

      A company's I.T. division will work 90% of the time fighting 10% of the information security threats

    • E. 

      None of the above

  • 3. 
    What can I do to reduce potential security threats?
    • A. 

      Do not share my password

    • B. 

      Turn off a computer's virus software

    • C. 

      Log out when I step away from my computer

    • D. 

      All of the above

    • E. 

      A and C

  • 4. 
    What does information security do?
    • A. 

      Guards the library

    • B. 

      Protects the network and inforamation systems

    • C. 

      Protects employee and citizen data

    • D. 

      Protects information on the internet

    • E. 

      B and C

  • 5. 
    Why is information security important?
    • A. 

      To support and protect critical business processes and systems

    • B. 

      To avoid potential fines

    • C. 

      To protect employee and citizen data

    • D. 

      None of the above

    • E. 

      All of the above

  • 6. 
    What is ethical hacking?
    • A. 

      An authorized attempt to gain unauthorized access to a computer system

    • B. 

      An unauthorized attempt to gain unauthorized access to a computer system

    • C. 

      Both a and b

    • D. 

      None

  • 7. 
    What is a virus in computer?
    • A. 

      Type of malicious software

    • B. 

      A parasite

    • C. 

      Both a and b

    • D. 

      None

  • 8. 
    Examples of viruses in computer are:
    • A. 

      Morris Worm

    • B. 

      Nimda

    • C. 

      SQL Slammer

    • D. 

      All of the above

  • 9. 
    How does a le-hard virus come into existence?
    • A. 

      Hardware

    • B. 

      Software

    • C. 

      Friday 13

    • D. 

      Command.Com

  • 10. 
    __________ major Ransomware Trojan targeting windows appeared in 2014?
    • A. 

      Banking theft

    • B. 

      WannaCry

    • C. 

      CryptoWall

    • D. 

      All of the above

  • 11. 
    Where can one find company process for Business Continuity Management?
    • A. 

      In IPMS

    • B. 

      In KNOWMAX

    • C. 

      In iQMS Wik

    • D. 

      In EPW

  • 12. 
    What type of password one should create?
    • A. 

      A combination of letters,, numbers, and symbols

    • B. 

      A combination of your first and last name

    • C. 

      Both a and b

    • D. 

      None

  • 13. 
    What is a term applied to unwanted applications or files that are not classified as malware but can worsen the performance of computers and may cause security risks?
    • A. 

      Malware

    • B. 

      Grayware

    • C. 

      Spyware

    • D. 

      All of the above

  • 14. 
    What is the name of the first boot sector virus?
    • A. 

      Corona

    • B. 

      Brain

    • C. 

      Stem

    • D. 

      None of the above

  • 15. 
    Phishing by text message is called
    • A. 

      Smishing

    • B. 

      Trojan horses

    • C. 

      Fishing

    • D. 

      All of the above

Back to Top Back to top