Flutterwave Integrated Management System Quiz

15 Questions | Total Attempts: 172

SettingsSettingsSettings
Flutterwave Integrated Management System Quiz - Quiz


Questions and Answers
  • 1. 
    Business Continuity plans should be created by? Select appropriate response(s). 
    • A. 

      Board members

    • B. 

      Team leads

    • C. 

      Business Continuity Manager

  • 2. 
    It is recommended that your business continuity plans be tested at what intervals?
    • A. 

      Every other year

    • B. 

      Whenever it is activated

    • C. 

      At least once a year

  • 3. 
    Business continuity is concerned with? Check all that apply
    • A. 

      Risks to the business

    • B. 

      Risks to the vendors

    • C. 

      Risks to our clients

  • 4. 
    The business impact analysis helps to identify which of the following?
    • A. 

      Most critical IT roles

    • B. 

      Most critical business functions

    • C. 

      Most critical IT functions

    • D. 

      Most critical business roles

  • 5. 
    The time at which a business function must be recovered following a disruptive incident is?
    • A. 

      Maximum Allowable Outage (MAO)

    • B. 

      Recovery Time Objective (RTO)

    • C. 

      Recovery Point Objective (RPO)

    • D. 

      Minimum Business continuity Objective (MBCO)

  • 6. 
    Business continuity primarily addresses what security objective?
    • A. 

      Confidentiality

    • B. 

      Accountability

    • C. 

      Integrity

    • D. 

      Availability

  • 7. 
    Whose duty is it to report incidents?
    • A. 

      IMS Manager

    • B. 

      Business Continuity Manager

    • C. 

      Mine

    • D. 

      Information Security Manager

  • 8. 
    Which of the following would be the best password?
    • A. 

      Keyboard

    • B. 

      Option 2

    • C. 

      Dp0si#Z$2

    • D. 

      MySecret

  • 9. 
    When receiving an email from an unknown contact that has an attachment, you should:
    • A. 

      Open the attachment to view its contents

    • B. 

      Report to the appropriate authority and delete the email

    • C. 

      Forward the email to your co-workers to allow them to open the attachment first

    • D. 

      Forward the email to your personal email account so you can open it at home

  • 10. 
    The first step in Security Awareness is being able to ________ a security threat?
    • A. 

      Log

    • B. 

      Avoid

    • C. 

      Recognize

    • D. 

      Challenge

  • 11. 
    All of these are good physical security practices except?
    • A. 

      Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you

    • B. 

      Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place

    • C. 

      When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body

    • D. 

      Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work

  • 12. 
    What should you do if you think your password has been compromised? Select all that apply.
    • A. 

      Change your password

    • B. 

      Report the incident to the proper authorities - such as a system administrator(s), information security team

    • C. 

      Check other systems that you have accounts on as they may be compromised as well

  • 13. 
    What should everyone know about information security? Check all that apply.
    • A. 

      Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them.

    • B. 

      Do not ignore unusual computer functioning. It might be a sign of malware

    • C. 

      Computer security is part of everyone's job

    • D. 

      Report anything suspicious to your system administrator

  • 14. 
    The classification system of Flutterwave’s information includes the following except?
    • A. 

      Restricted

    • B. 

      Public

    • C. 

      Intergrity

    • D. 

      Confidential

  • 15. 
    Which of the following is not a major aspect of information security?
    • A. 

      Availability

    • B. 

      Integrity

    • C. 

      Convenience

    • D. 

      Confidentiality

Back to Top Back to top