Discovia Security Awareness Training

20 Questions | Total Attempts: 346

SettingsSettingsSettings
Please wait...
Discovia Security Awareness Training

Test you knowledge of Disocvia's security practices.


Questions and Answers
  • 1. 
    Personal e-mail should not be used under any circumstances while at work.
    • A. 

      True

    • B. 

      False

  • 2. 
    “Client Data” includes the documents and email received for processing in addition to Discovia generated statements of work and service agreements
    • A. 

      True

    • B. 

      False

  • 3. 
    Discovia’s network is so secure that viruses cannot get in.
    • A. 

      True

    • B. 

      False

  • 4. 
    Unless directed by the client to the contrary, client data should always be encrypted when stored on portable media.
    • A. 

      True

    • B. 

      False

  • 5. 
    All of Discovia’s data is confidential
    • A. 

      True

    • B. 

      False

  • 6. 
    Production media may be kept at my desk as long as it’s inside of the card key protected suite.
    • A. 

      True

    • B. 

      False

  • 7. 
    If I use my mobile phone for Discovia purposes, I authorize Discovia to wipe my device under certain circumstances
    • A. 

      True

    • B. 

      False

  • 8. 
    No one should ask for my password except for IT
    • A. 

      True

    • B. 

      False

  • 9. 
    E-mail is an acceptable means to receive client data if it’s just a few documents or a single PST.
    • A. 

      True

    • B. 

      False

  • 10. 
    You can opt out of using a laptop lock for your machine if you only work in the office
    • A. 

      True

    • B. 

      False

  • 11. 
    On my personally owned computer, I can save client data only when:
    • A. 

      It’s been cleared by my manager

    • B. 

      It’s been cleared by a Senior Manager

    • C. 

      The data is required for me to do my job

    • D. 

      The data is encrypted and has been approved by my manager

    • E. 

      None of the above

  • 12. 
    A client reports possible corruption of source files while conducting doc review. To investigate the source of the trouble:
    • A. 

      The project manager should download the source file to their local laptop for further examination and/or repair.

    • B. 

      The file should be emailed as an attachment to Operations and/or Forensics (as appropriate) for their examination and advice.

    • C. 

      The file should be examined from the network drive or download locally to an Operations virtual machine or Forensics lab computer.

    • D. 

      The file should be emailed to the client so they can confirm it has been corrected.

    • E. 

      All of the above

  • 13. 
    Personal use of the company’s computers or internet access is allowed provided that:
    • A. 

      The usage is reasonable and does not interfere with the performance of the user’s job or the efficient conduct of Discovia’s business.

    • B. 

      Does not include the use of your Discovia email address for non-business use

    • C. 

      Does not include conducting Discovia business on non-business email accounts (such as gmail).

    • D. 

      Does not include the installation of unlicensed or unapproved applications.

    • E. 

      All of the above.

  • 14. 
    Installing software is ok as long as:
    • A. 

      The client requires we use it

    • B. 

      This is a trick question, installing software on my computer is never ok

    • C. 

      The software is to make my computer perform better (anti-virus, reg cleaner.)

    • D. 

      It is approved for use by IT Operations

    • E. 

      There is a useful business application for it

  • 15. 
    If I believe a computer has been infected by a virus I should:
    • A. 

      Turn it off immediately

    • B. 

      Notify IT

    • C. 

      Preserve the current state of the operating system

    • D. 

      Disconnect the computer from the network

    • E. 

      B,C, and D

  • 16. 
    I can buy stock in a Discovia client or end-client company:
    • A. 

      Never

    • B. 

      After 90 Days

    • C. 

      With CEO and/or President approval

    • D. 

      If I intend to keep the stock for at least a year

    • E. 

      B,C, and D

    • F. 

      C and D

  • 17. 
    The threats Discovia faces, which I have control over include:
    • A. 

      Insider Trading

    • B. 

      Viruses

    • C. 

      Social Engineering

    • D. 

      Password Leakage

    • E. 

      Spyware

    • F. 

      All of the above

  • 18. 
    Using my personal laptop or home computer for company business is approved if:
    • A. 

      The usage is limited to Terminal Server or OWA and company data is not stored locally

    • B. 

      Actually it never is

    • C. 

      It is not a Mac

    • D. 

      It is approved by IT Operations

    • E. 

      As a substitute for my company issued computer as long as I return the company machine to IT

  • 19. 
    In the context of the Discovia security and awareness training CIA stands for:
    • A. 

      Confidentiality, Integrity, Availability

    • B. 

      Central Intelligence Agency

    • C. 

      Culinary Institute of America

    • D. 

      Character, Intelligence, Agreement

    • E. 

      All of the above

  • 20. 
    The published up-to-date policy and plan documents relevant to the company’s Information Security and Risk Management plan can be obtained from:
    • A. 

      Http://DiscoNet

    • B. 

      The network F:\ Drive

    • C. 

      The employee handbook

    • D. 

      My new hire paperwork

    • E. 

      Binders conveniently located in the office

Back to Top Back to top