Credly Data Security And Privacy Quiz!

20 Questions | Total Attempts: 81

SettingsSettingsSettings
Please wait...
Company Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which of the following laws is Credly required to comply with?
    • A. 

      Health Insurance Portability and Accountability Act (HIPPA)

    • B. 

      The Privacy Act of 1974

    • C. 

      Health Information Technology for Economic and Clinical Health Act (HITECH Act)

    • D. 

      Family Educational Rights and Privacy Act (FERPA)

  • 2. 
    What is NOT an information classification at Credly?
    • A. 

      Confidential

    • B. 

      Top Secret

    • C. 

      Sensitive

    • D. 

      Public

  • 3. 
    What is the most important layer of security at Credly? 
    • A. 

      The firewall layer

    • B. 

      The application layer

    • C. 

      Credly's employees

    • D. 

      The YourAcclaim security controls managed by Amazon Web Services

  • 4. 
    What is an example of confidential information?
    • A. 

      The source code to the Acclaim platform

    • B. 

      A blog post on the Credly website

    • C. 

      A Credential Earner's profile information

    • D. 

      A press release authorized for release by the marketing team

  • 5. 
    What does the General Data Protection Regulation (GDPR) regulate? 
    • A. 

      Credit card information of Credly’s clients

    • B. 

      Use and disclosure of personally identifiable information of EU residents.

    • C. 

      Information about Credly’s finances

    • D. 

      Appropriate workplace conduct at the Credly WeWork office

  • 6. 
    Where is NOT an appropriate place to store Credly Confidential Information? 
    • A. 

      The Google share drive

    • B. 

      The Amazon Web Services production server

    • C. 

      An encrypted email sent from a @credly.com account

    • D. 

      Your work laptop

  • 7. 
    How often must you change your password? 
    • A. 

      Never

    • B. 

      Every 60 days

    • C. 

      Every 30 days

    • D. 

      Every 90 days

    • E. 

      Whenever you feel like it

  • 8. 
    What is an example of phishing? 
    • A. 

      Somebody deletes items from the Credly database using a SQL injection

    • B. 

      Somebody calls you impersonating a technical support representative to gain sensitive information from you

    • C. 

      Somebody follows you into the WeWork office after you leave the door open

    • D. 

      Somebody steals a mobile device from a Credly employee

  • 9. 
    What should you do when you leave your workspace? 
    • A. 

      Lock your door

    • B. 

      Lock your computer

    • C. 

      Make sure your desk is clean and free of any paper with confidential information

    • D. 

      All of the above

  • 10. 
    Which of the following is an acceptable password?
  • 11. 
    What does Credly consider to be “Sensitive Information” per the Information Classification Guidelines? 
    • A. 

      Earner personal information

    • B. 

      Source code

    • C. 

      Credly’s financial information 

    • D. 

      Client confidential information 

    • E. 

      Credit card numbers

  • 12. 
    How often is the Credly Business Continuity Plan tested?
    • A. 

      Monthly

    • B. 

      Bi-weekly

    • C. 

      Annually

    • D. 

      Upon request by a client

  • 13. 
    What does it to maintain the “integrity” of data? 
    • A. 

      To ensure that the data is easy to access when needed

    • B. 

      To ensure that only other employees at Credly can see your password

    • C. 

      To ensure that data is not altered or destroyed in an unauthorized manner

    • D. 

      To ensure that data is only transferred pursuant to a lawful government request

  • 14. 
    Who should you report security incidents to first? 
    • A. 

      The Central Intelligence Agency

    • B. 

      The Director of People Operations

    • C. 

      The Security Council

    • D. 

      No need to report Security Incidents; just make sure it doesn’t happen again

  • 15. 
    How do you prove that you changed your antivirus software? 
    • A. 

      Email the Security Council or Legal Operations Manager a screenshot

    • B. 

      Post your screenshot on Slack

    • C. 

      Call and tell the Legal Operations Manager

    • D. 

      Ask the antivirus software company to send Credly a report

  • 16. 
    Which Credly employees are required to read the Credly policies and undergo security training? 
    • A. 

      The Product Team

    • B. 

      The Customer Success Team

    • C. 

      Only Credly employees that interact with Earner personal information

    • D. 

      All Credly employees

  • 17. 
    What is a mobile device? 
    • A. 

      A laptop

    • B. 

      A mobile phone

    • C. 

      A & B

    • D. 

      None of the above

  • 18. 
    Where are Credly policies and procedures located? 
    • A. 

      On your personal mobile device

    • B. 

      On http://www.youracclaim.com

    • C. 

      On the company intranet

    • D. 

      On the Amazon Web Services server

  • 19. 
    When is the Business Continuity Plan used?
    • A. 

      On holidays and weekends

    • B. 

      When a disaster requires all Credly employees to evacuate the WeWork locations

    • C. 

      When the Youracclaim website becomes unavailable 

    • D. 

      B & C

    • E. 

      A & B

  • 20. 
    What is the most common cause of security incidents?
    • A. 

       An honest mistake by an employee

    • B. 

      Outside hackers 

    • C. 

      Power failures

    • D. 

       Insider threats