Information Security Policy: Trivia Quiz!

29 Questions | Total Attempts: 56

SettingsSettingsSettings
Information Security Policy: Trivia Quiz! - Quiz

.


Questions and Answers
  • 1. 
    Social Media Policy applies to:
    • A. 

      All PTC individuals

    • B. 

      Technology infrastructure team

    • C. 

      Communications systems

    • D. 

      Computer software and databases

  • 2. 
    Don't alter previous posts without indicating that you have done so. 
    • A. 

      Correct your mistakes

    • B. 

      Leave the error as this is not a face to face conversation

    • C. 

      Avoid chiming

    • D. 

      None of these

  • 3. 
    According to PTC password Policy, the PTC password expires in _____ days.
    • A. 

      30

    • B. 

      60

    • C. 

      90

    • D. 

      180

  • 4. 
    Is it ok to create a link from your blog, website, or another social networking site to a PTC website without identifying yourself as an associate of PTC.
    • A. 

      Yes

    • B. 

      No

  • 5. 
    PTC Password must be at least ________ characters in Length.
    • A. 

      10

    • B. 

      12

    • C. 

      8

    • D. 

      6

  • 6. 
    Service Account password expires after every ______ days.
    • A. 

      90

    • B. 

      120

    • C. 

      180

    • D. 

      60

  • 7. 
    How many digits Password on mobile devices is required by PTC? 
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

  • 8. 
    The MDMS will not inventory the following information:
    • A. 

      Identification

    • B. 

      OS version

    • C. 

      Installed Applications

    • D. 

      Mobile Roaming Status

  • 9. 
    The Personal Data on PTC owned devices can be remotely wiped by PTC IT for Security Reasons? 
    • A. 

      True

    • B. 

      False

  • 10. 
    What is full form of RFC?
    • A. 

      Review for Change

    • B. 

      Request for change

    • C. 

      Recently Filed Change

    • D. 

      None of these

  • 11. 
    Who is responsible for updating information security policy?
    • A. 

      Information Security committee

    • B. 

      Security manager

    • C. 

      IT Team

    • D. 

      None of these

  • 12. 
    Does information security policy apply to contractors?
    • A. 

      Yes

    • B. 

      No

  • 13. 
    Third party software policy include independent contractors engaged by PTC on PTC owned equipment?
    • A. 

      True

    • B. 

      False

  • 14. 
    Third Party software Policy applies to : -          a.All third party software acquired by PTC          b.Its Subsidiaries          c.Installed on PTC equipment          d.Software acquired by the PTC Royalties group or open source software that is approved  by the PTC open source committee ( [email protected] )     
    • A. 

      A, b, c

    • B. 

      D

    • C. 

      A,b,c,d

    • D. 

      A,b,c, excluding d

  • 15. 
    Which of the these are appropriate in accordance with ‘’ Acceptable use of Third Party Software ‘’        a.  Software Asset Management Process - Secure repository for storage of software licenses and that all software be procured through official and clearly-defined procedures.        b.  Use of Personally Owned Software on PTC equipment        c. Software acquired through acquisition of another company        d.  Use of PTC-Owned software on Personally-Owned devices        e. Duty to report violation
    • A. 

      A,b,c,d,e

    • B. 

      A,c,d

    • C. 

      A,b,c,d

    • D. 

      A,d,b

  • 16. 
    Which of the following are categories of requests/tickets in SD+? 
    • A. 

      Service & Maintenance

    • B. 

      Maintenance & Decommission

    • C. 

      Service & Incidence

    • D. 

      Decommission

  • 17. 
    Which of the following is not a section of a request view?
    • A. 

      Header

    • B. 

      Description

    • C. 

      Communication

    • D. 

      Footer

  • 18. 
    Which of the following is not a service category template in SD+?
    • A. 

      Hardware

    • B. 

      Software

    • C. 

      Undefined

    • D. 

      General

  • 19. 
    What is ISMS?
    • A. 

      International Security Management System

    • B. 

      International Software Management System

    • C. 

      Indian Software Management System

    • D. 

      Information Security Management System

  • 20. 
    What are the 3 different services that CS includes to optimize solution performance and ensure maximum value with minimum risk or burden?
    • A. 

      SLM

    • B. 

      PLM

    • C. 

      IOT

    • D. 

      InService

  • 21. 
    What are the main Information security objectives for CS?
    • A. 

      Controlling user accesses

    • B. 

      Protection of customer data

    • C. 

      Service availability

    • D. 

      Customizing solution

  • 22. 
    Teams that are responsible for handling and resolving information security incidents are:
    • A. 

      Security Manager

    • B. 

      CS Team

    • C. 

      Security Manager & CS Team

    • D. 

      None of the above

  • 23. 
    ______________ executes vulnerability scan; record scan tests; follow Change Management process to apply necessary changes in systems.
    • A. 

      Security Manager

    • B. 

      CS Manager

    • C. 

      CS team members

    • D. 

      None of the above

  • 24. 
    To which of the following a PTC employee can share his/her account or password details:
    • A. 

      Business Partners

    • B. 

      Other PTC personnel

    • C. 

      Family

    • D. 

      No one

  • 25. 
    It is recommended to secure PTC laptops with a password-protected screensaver with automatic activation feature set to:
    • A. 

      30 mins

    • B. 

      20 mins

    • C. 

      10 mins or less

    • D. 

      None of these

Back to Top Back to top