Credly Data Security And Privacy Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rtaheri
R
Rtaheri
Community Contributor
Quizzes Created: 2 | Total Attempts: 539
Questions: 19 | Attempts: 335

SettingsSettingsSettings
Credly Data Security And Privacy Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Which of the following laws is Credly required to comply with?

    • A.

      Health Insurance Portability and Accountability Act (HIPPA)

    • B.

      The Privacy Act of 1974

    • C.

      Health Information Technology for Economic and Clinical Health Act (HITECH Act)

    • D.

      Family Educational Rights and Privacy Act (FERPA)

    Correct Answer
    D. Family Educational Rights and Privacy Act (FERPA)
    Explanation
    Credly is required to comply with the Family Educational Rights and Privacy Act (FERPA). This law protects the privacy of student education records and regulates how educational institutions handle and disclose these records. Since Credly deals with educational information and credentials, it is necessary for them to adhere to FERPA guidelines to ensure the privacy and security of student data.

    Rate this question:

  • 2. 

    What is NOT an information classification at Credly?

    • A.

      Confidential

    • B.

      Top Secret

    • C.

      Sensitive

    • D.

      Public

    Correct Answer
    B. Top Secret
    Explanation
    The given question asks for an information classification that is NOT at Credly. The options provided are "Confidential," "Top Secret," "Sensitive," and "Public." The correct answer is "Top Secret" because it is not listed among the information classifications at Credly.

    Rate this question:

  • 3. 

    What is the most important layer of security at Credly? 

    • A.

      The firewall layer

    • B.

      The application layer

    • C.

      Credly's employees

    • D.

      The YourAcclaim security controls managed by Amazon Web Services

    Correct Answer
    C. Credly's employees
    Explanation
    Credly's employees are the most important layer of security at Credly because they are responsible for implementing and maintaining security protocols and practices within the organization. They are trained to identify and respond to security threats, follow best practices for data protection, and ensure the overall security of Credly's systems and infrastructure. Their knowledge and expertise play a crucial role in safeguarding sensitive information and preventing unauthorized access or breaches.

    Rate this question:

  • 4. 

    What is an example of confidential information?

    • A.

      The source code to the Acclaim platform

    • B.

      A blog post on the Credly website

    • C.

      A Credential Earner's profile information

    • D.

      A press release authorized for release by the marketing team

    Correct Answer
    A. The source code to the Acclaim platform
    Explanation
    An example of confidential information is the source code to the Acclaim platform. This refers to the underlying code that powers the platform and is not meant to be accessible or known to the general public. The source code contains sensitive information and intellectual property that needs to be protected from unauthorized access or use.

    Rate this question:

  • 5. 

    What does the General Data Protection Regulation (GDPR) regulate? 

    • A.

      Credit card information of Credly’s clients

    • B.

      Use and disclosure of personally identifiable information of EU residents.

    • C.

      Information about Credly’s finances

    • D.

      Appropriate workplace conduct at the Credly WeWork office

    Correct Answer
    B. Use and disclosure of personally identifiable information of EU residents.
    Explanation
    The General Data Protection Regulation (GDPR) regulates the use and disclosure of personally identifiable information of EU residents. This means that organizations that collect, process, or store personal data of EU residents must comply with the GDPR's requirements regarding data protection, consent, transparency, and individual rights. The GDPR aims to ensure that individuals have control over their personal data and that organizations handle it responsibly and securely. It applies to both EU-based organizations and organizations outside the EU that offer goods or services to EU residents or monitor their behavior.

    Rate this question:

  • 6. 

    Where is NOT an appropriate place to store Credly Confidential Information? 

    • A.

      The Google share drive

    • B.

      The Amazon Web Services production server

    • C.

      An encrypted email sent from a @credly.com account

    • D.

      Your work laptop

    Correct Answer
    D. Your work laptop
    Explanation
    Storing Credly Confidential Information on a work laptop is not an appropriate place because it is susceptible to security breaches and unauthorized access. Work laptops are often used outside of secure environments and can be easily lost or stolen. Additionally, work laptops may not have the necessary security measures in place to protect sensitive information. It is always recommended to store confidential information in secure and approved platforms or servers, such as the Google share drive or the Amazon Web Services production server, which are designed to protect data and prevent unauthorized access. An encrypted email sent from a @credly.com account can also be a secure option for transmitting sensitive information.

    Rate this question:

  • 7. 

    How often must you change your password? 

    • A.

      Never

    • B.

      Every 60 days

    • C.

      Every 30 days

    • D.

      Every 90 days

    • E.

      Whenever you feel like it

    Correct Answer
    D. Every 90 days
    Explanation
    It is recommended to change passwords regularly to maintain security. Changing passwords every 90 days helps to protect against potential unauthorized access and reduces the risk of password-related security breaches. This timeframe strikes a balance between ensuring security and minimizing inconvenience for the user.

    Rate this question:

  • 8. 

    What is an example of phishing? 

    • A.

      Somebody deletes items from the Credly database using a SQL injection

    • B.

      Somebody calls you impersonating a technical support representative to gain sensitive information from you

    • C.

      Somebody follows you into the WeWork office after you leave the door open

    • D.

      Somebody steals a mobile device from a Credly employee

    Correct Answer
    B. Somebody calls you impersonating a technical support representative to gain sensitive information from you
    Explanation
    The correct answer is "Somebody calls you impersonating a technical support representative to gain sensitive information from you." This is an example of phishing because the person is pretending to be a legitimate representative in order to deceive and trick the individual into providing sensitive information. Phishing often involves impersonation and social engineering tactics to manipulate victims into revealing personal or financial information.

    Rate this question:

  • 9. 

    What should you do when you leave your workspace? 

    • A.

      Lock your door

    • B.

      Lock your computer

    • C.

      Make sure your desk is clean and free of any paper with confidential information

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    When leaving your workspace, it is important to take certain precautions. Locking your door ensures that unauthorized individuals cannot access your workspace, protecting the privacy and security of any sensitive information. Locking your computer prevents unauthorized access to your files and data. Making sure your desk is clean and free of any paper with confidential information helps to maintain confidentiality and prevent any potential data breaches. Therefore, all of the above actions should be taken when leaving your workspace to ensure the security and privacy of your work area.

    Rate this question:

  • 10. 

    Which of the following is an acceptable password?

    • A.

      123456

    • B.

      Apples3

    • C.

      F@3ta$t!c&

    • D.

      Nancyspass

    Correct Answer
    C. F@3ta$t!c&
    Explanation
    The password "F@3ta$t!c&" is an acceptable password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more secure and harder to guess or crack.

    Rate this question:

  • 11. 

    What does Credly consider to be “Sensitive Information” per the Information Classification Guidelines? 

    • A.

      Earner personal information

    • B.

      Source code

    • C.

      Credly’s financial information 

    • D.

      Client confidential information 

    • E.

      Credit card numbers

    Correct Answer
    A. Earner personal information
    Explanation
    Credly considers "Earner personal information" to be "Sensitive Information" per the Information Classification Guidelines. This means that Credly considers personal information of earners, such as their name, contact details, and any other personally identifiable information, to be sensitive and in need of protection.

    Rate this question:

  • 12. 

    How often is the Credly Business Continuity Plan tested?

    • A.

      Monthly

    • B.

      Bi-weekly

    • C.

      Annually

    • D.

      Upon request by a client

    Correct Answer
    C. Annually
    Explanation
    The Credly Business Continuity Plan is tested annually. This means that the plan is reviewed, evaluated, and practiced once every year to ensure its effectiveness and readiness in the event of a disruption or disaster. Regular testing allows the organization to identify any weaknesses or gaps in the plan and make necessary improvements. By conducting annual tests, Credly can maintain a robust and up-to-date plan that can effectively mitigate risks and ensure the continuity of their business operations.

    Rate this question:

  • 13. 

    What does it to maintain the “integrity” of data? 

    • A.

      To ensure that the data is easy to access when needed

    • B.

      To ensure that only other employees at Credly can see your password

    • C.

      To ensure that data is not altered or destroyed in an unauthorized manner

    • D.

      To ensure that data is only transferred pursuant to a lawful government request

    Correct Answer
    C. To ensure that data is not altered or destroyed in an unauthorized manner
    Explanation
    The correct answer is to ensure that data is not altered or destroyed in an unauthorized manner. This means that measures are put in place to protect the data from being tampered with or deleted without proper authorization. This can include implementing security protocols, access controls, and backup systems to safeguard the integrity of the data.

    Rate this question:

  • 14. 

    Who should you report security incidents to first? 

    • A.

      The Central Intelligence Agency

    • B.

      The Director of People Operations

    • C.

      The Security Council

    • D.

      No need to report Security Incidents; just make sure it doesn’t happen again

    Correct Answer
    C. The Security Council
    Explanation
    The Security Council should be the first point of contact to report security incidents. They are responsible for overseeing and coordinating security measures within an organization. By reporting incidents to the Security Council, they can take appropriate actions to address the issue and prevent similar incidents from occurring in the future.

    Rate this question:

  • 15. 

    How do you prove that you changed your antivirus software? 

    • A.

      Email the Security Council or Legal Operations Manager a screenshot

    • B.

      Post your screenshot on Slack

    • C.

      Call and tell the Legal Operations Manager

    • D.

      Ask the antivirus software company to send Credly a report

    Correct Answer
    A. Email the Security Council or Legal Operations Manager a screenshot
    Explanation
    To prove that you changed your antivirus software, you can email the Security Council or Legal Operations Manager a screenshot. This screenshot will serve as evidence of the change made to your antivirus software. By sending the screenshot via email, you can provide a visual confirmation of the update to the relevant authorities.

    Rate this question:

  • 16. 

    Which Credly employees are required to read the Credly policies and undergo security training? 

    • A.

      The Product Team

    • B.

      The Customer Success Team

    • C.

      Only Credly employees that interact with Earner personal information

    • D.

      All Credly employees

    Correct Answer
    D. All Credly employees
    Explanation
    All Credly employees are required to read the Credly policies and undergo security training. This means that every employee, regardless of their department or role, must familiarize themselves with the company's policies and undergo training to ensure the security and privacy of Credly's users and their personal information.

    Rate this question:

  • 17. 

    What is a mobile device? 

    • A.

      A laptop

    • B.

      A mobile phone

    • C.

      A & B

    • D.

      None of the above

    Correct Answer
    C. A & B
    Explanation
    A mobile device refers to a portable electronic device that can be easily carried around. It includes both laptops and mobile phones, as they are designed to be used on the go and provide wireless connectivity. Therefore, the correct answer is A & B, as both options are considered mobile devices.

    Rate this question:

  • 18. 

    Where are Credly policies and procedures located? 

    • A.

      On your personal mobile device

    • B.

      On http://www.youracclaim.com

    • C.

      On the company intranet

    • D.

      On the Amazon Web Services server

    Correct Answer
    C. On the company intranet
    Explanation
    The correct answer is "On the company intranet." Credly policies and procedures are located on the company intranet, which is a private network accessible only to employees within the organization. This is a common practice for companies to store and share internal documents, guidelines, and protocols. The intranet provides a secure and controlled environment for employees to access important information related to the company's policies and procedures.

    Rate this question:

  • 19. 

    What is the most common cause of security incidents?

    • A.

       An honest mistake by an employee

    • B.

      Outside hackers 

    • C.

      Power failures

    • D.

       Insider threats

    Correct Answer
    A.  An honest mistake by an employee
    Explanation
    An honest mistake by an employee is the most common cause of security incidents because employees may unintentionally click on malicious links, share sensitive information with unauthorized individuals, or mishandle data, leading to security breaches. These mistakes can occur due to lack of awareness, inadequate training, or negligence, making them a significant threat to an organization's security.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 02, 2020
    Quiz Created by
    Rtaheri
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.