The Flutterwave Integrated Management System Quiz evaluates knowledge on business continuity, including planning, impact analysis, and recovery objectives. It's designed to ensure learners understand how to maintain business operations under adverse conditions, focusing on critical functions and availability.
Every other year
Whenever it is activated
At least once a year
Rate this question:
Risks to the business
Risks to the vendors
Risks to our clients
Rate this question:
Most critical IT roles
Most critical business functions
Most critical IT functions
Most critical business roles
Rate this question:
Maximum Allowable Outage (MAO)
Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
Minimum Business continuity Objective (MBCO)
Rate this question:
Confidentiality
Accountability
Integrity
Availability
Rate this question:
IMS Manager
Business Continuity Manager
Mine
Information Security Manager
Rate this question:
Keyboard
Option 2
Dp0si#Z$2
MySecret
Rate this question:
Open the attachment to view its contents
Report to the appropriate authority and delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home
Rate this question:
Log
Avoid
Recognize
Challenge
Rate this question:
Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you
Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place
When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body
Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work
Rate this question:
Change your password
Report the incident to the proper authorities - such as a system administrator(s), information security team
Check other systems that you have accounts on as they may be compromised as well
Rate this question:
Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them.
Do not ignore unusual computer functioning. It might be a sign of malware
Computer security is part of everyone's job
Report anything suspicious to your system administrator
Rate this question:
Restricted
Public
Intergrity
Confidential
Rate this question:
Availability
Integrity
Convenience
Confidentiality
Rate this question:
Quiz Review Timeline (Updated): Jul 13, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.