Discovia Security Awareness Training

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Discovia
D
Discovia
Community Contributor
Quizzes Created: 1 | Total Attempts: 463
Questions: 20 | Attempts: 463

SettingsSettingsSettings
Discovia Security Awareness Training - Quiz

Test you knowledge of Disocvia's security practices.


Questions and Answers
  • 1. 

    Personal e-mail should not be used under any circumstances while at work.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Using personal e-mail at work is generally discouraged, but it is not always prohibited. Many companies have policies in place regarding the use of personal e-mail, and some may allow limited use for non-work-related purposes during designated break times. However, it is important to exercise caution and use personal e-mail responsibly to ensure that it does not interfere with work productivity or compromise sensitive information. Therefore, the statement that personal e-mail should not be used under any circumstances while at work is too absolute and not entirely accurate.

    Rate this question:

  • 2. 

    “Client Data” includes the documents and email received for processing in addition to Discovia generated statements of work and service agreements

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because "Client Data" refers only to the documents and email received for processing, and does not include Discovia generated statements of work and service agreements.

    Rate this question:

  • 3. 

    Discovia’s network is so secure that viruses cannot get in.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is an overstatement and cannot be completely true. While Discovia's network may have strong security measures in place, it is impossible to claim that viruses cannot get in. No network can guarantee 100% protection against all types of viruses. It is always important to have additional security measures and precautions in place to minimize the risk of viruses and other cyber threats.

    Rate this question:

  • 4. 

    Unless directed by the client to the contrary, client data should always be encrypted when stored on portable media.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Client data should always be encrypted when stored on portable media to ensure its security and prevent unauthorized access. Encrypting the data adds an extra layer of protection, making it more difficult for hackers or unauthorized individuals to read or use the information if the portable media is lost or stolen. This helps to maintain the confidentiality and integrity of the client's data, which is crucial for maintaining trust and compliance with data protection regulations.

    Rate this question:

  • 5. 

    All of Discovia’s data is confidential

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "All of Discovia's data is confidential" is not true. It implies that every single piece of data owned by Discovia is confidential, which may not be the case. Some data might be confidential, but it is unlikely that all of Discovia's data falls under the category of confidential information. Therefore, the correct answer is False.

    Rate this question:

  • 6. 

    Production media may be kept at my desk as long as it’s inside of the card key protected suite.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because production media should not be kept at the desk, even if it is inside a card key protected suite. It is important to store production media in a secure and designated location to prevent unauthorized access or potential damage. Keeping it at the desk increases the risk of loss, theft, or accidental exposure to unauthorized individuals.

    Rate this question:

  • 7. 

    If I use my mobile phone for Discovia purposes, I authorize Discovia to wipe my device under certain circumstances

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that if the individual uses their mobile phone for Discovia purposes, they give permission to Discovia to delete or erase the data on their device in specific situations. This indicates that the individual acknowledges and accepts the potential consequences of using their mobile phone for Discovia activities, including the possibility of data deletion.

    Rate this question:

  • 8. 

    No one should ask for my password except for IT

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "No one should ask for my password except for IT" implies that only the IT department should ask for the password. However, this is not true. It is important to be cautious and not share passwords with anyone, including the IT department. It is best to follow proper security protocols and only provide passwords when necessary and through secure channels. Sharing passwords can lead to unauthorized access and compromise of personal or sensitive information.

    Rate this question:

  • 9. 

    E-mail is an acceptable means to receive client data if it’s just a few documents or a single PST.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because e-mail is not an acceptable means to receive client data, even if it's just a few documents or a single PST. E-mail is not a secure method of transferring sensitive data, as it can be intercepted or hacked. It is recommended to use more secure methods such as encrypted file transfer or secure file sharing platforms to protect client data.

    Rate this question:

  • 10. 

    You can opt out of using a laptop lock for your machine if you only work in the office

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It is not advisable to opt out of using a laptop lock even if you only work in the office. While the risk of theft may be lower in the office, there is still a possibility of unauthorized access or theft by employees or visitors. Additionally, laptops are portable and can be easily taken outside of the office, increasing the risk of theft. Therefore, it is important to use a laptop lock to ensure the security of the device and any sensitive information it may contain.

    Rate this question:

  • 11. 

    On my personally owned computer, I can save client data only when:

    • A.

      It’s been cleared by my manager

    • B.

      It’s been cleared by a Senior Manager

    • C.

      The data is required for me to do my job

    • D.

      The data is encrypted and has been approved by my manager

    • E.

      None of the above

    Correct Answer
    E. None of the above
    Explanation
    The correct answer is "None of the above" because none of the given conditions specify the criteria for saving client data on the personally owned computer. The question suggests that there might be other requirements or conditions not mentioned in the options that determine when client data can be saved.

    Rate this question:

  • 12. 

    A client reports possible corruption of source files while conducting doc review. To investigate the source of the trouble:

    • A.

      The project manager should download the source file to their local laptop for further examination and/or repair.

    • B.

      The file should be emailed as an attachment to Operations and/or Forensics (as appropriate) for their examination and advice.

    • C.

      The file should be examined from the network drive or download locally to an Operations virtual machine or Forensics lab computer.

    • D.

      The file should be emailed to the client so they can confirm it has been corrected.

    • E.

      All of the above

    Correct Answer
    C. The file should be examined from the network drive or download locally to an Operations virtual machine or Forensics lab computer.
    Explanation
    The correct answer is to examine the file from the network drive or download it locally to an Operations virtual machine or Forensics lab computer. This approach allows for a thorough examination of the file while minimizing the risk of further corruption or loss of data. By analyzing the file in a controlled environment, the project manager can accurately assess the extent of the corruption and determine the appropriate course of action for repair or recovery.

    Rate this question:

  • 13. 

    Personal use of the company’s computers or internet access is allowed provided that:

    • A.

      The usage is reasonable and does not interfere with the performance of the user’s job or the efficient conduct of Discovia’s business.

    • B.

      Does not include the use of your Discovia email address for non-business use

    • C.

      Does not include conducting Discovia business on non-business email accounts (such as gmail).

    • D.

      Does not include the installation of unlicensed or unapproved applications.

    • E.

      All of the above.

    Correct Answer
    E. All of the above.
    Explanation
    The correct answer is "All of the above" because the statement includes all the conditions that need to be met for personal use of the company's computers or internet access to be allowed. These conditions include: the usage being reasonable and not interfering with job performance or business efficiency, not using the Discovia email address for non-business purposes, not conducting Discovia business on non-business email accounts, and not installing unlicensed or unapproved applications.

    Rate this question:

  • 14. 

    Installing software is ok as long as:

    • A.

      The client requires we use it

    • B.

      This is a trick question, installing software on my computer is never ok

    • C.

      The software is to make my computer perform better (anti-virus, reg cleaner.)

    • D.

      It is approved for use by IT Operations

    • E.

      There is a useful business application for it

    Correct Answer
    D. It is approved for use by IT Operations
    Explanation
    Installing software on a computer should only be done if it is approved for use by IT Operations. This ensures that the software is compatible with the system and meets the necessary security and operational requirements. Installing software without approval can lead to compatibility issues, security vulnerabilities, and potential violations of company policies. Therefore, it is important to follow the proper procedures and obtain approval before installing any software on a computer.

    Rate this question:

  • 15. 

    If I believe a computer has been infected by a virus I should:

    • A.

      Turn it off immediately

    • B.

      Notify IT

    • C.

      Preserve the current state of the operating system

    • D.

      Disconnect the computer from the network

    • E.

      B,C, and D

    Correct Answer
    E. B,C, and D
    Explanation
    If a computer is believed to be infected by a virus, it is important to notify the IT department so that they can take appropriate action to address the issue. Preserving the current state of the operating system is also crucial as it can help in identifying the virus and potentially recovering any lost data. Disconnecting the computer from the network is necessary to prevent the virus from spreading to other systems. Therefore, options B, C, and D are all necessary steps to take in such a situation.

    Rate this question:

  • 16. 

    I can buy stock in a Discovia client or end-client company:

    • A.

      Never

    • B.

      After 90 Days

    • C.

      With CEO and/or President approval

    • D.

      If I intend to keep the stock for at least a year

    • E.

      B,C, and D

    • F.

      C and D

    Correct Answer
    F. C and D
    Explanation
    The correct answer is C and D. This means that you can buy stock in a Discovia client or end-client company only with CEO and/or President approval, and if you intend to keep the stock for at least a year. This indicates that there are certain restrictions and conditions in place for buying stock in these companies, and it requires the approval of higher-level executives.

    Rate this question:

  • 17. 

    The threats Discovia faces, which I have control over include:

    • A.

      Insider Trading

    • B.

      Viruses

    • C.

      Social Engineering

    • D.

      Password Leakage

    • E.

      Spyware

    • F.

      All of the above

    Correct Answer
    F. All of the above
    Explanation
    The correct answer is "All of the above". This means that Discovia faces all of the mentioned threats, including insider trading, viruses, social engineering, password leakage, and spyware. These threats can potentially harm the company's security and confidentiality. Insider trading refers to the illegal practice of trading stocks based on non-public information. Viruses can infect computer systems and disrupt operations. Social engineering involves manipulating individuals to gain unauthorized access. Password leakage refers to the unauthorized disclosure of passwords. Spyware is malicious software that gathers information without the user's consent. Therefore, all these threats pose risks to Discovia.

    Rate this question:

  • 18. 

    Using my personal laptop or home computer for company business is approved if:

    • A.

      The usage is limited to Terminal Server or OWA and company data is not stored locally

    • B.

      Actually it never is

    • C.

      It is not a Mac

    • D.

      It is approved by IT Operations

    • E.

      As a substitute for my company issued computer as long as I return the company machine to IT

    Correct Answer
    A. The usage is limited to Terminal Server or OWA and company data is not stored locally
    Explanation
    The correct answer states that using personal laptops or home computers for company business is approved only if the usage is limited to Terminal Server or OWA (Outlook Web Access) and company data is not stored locally. This means that employees can access company resources and perform work tasks using these approved methods, but they should not save any company data on their personal devices. This helps to ensure the security and integrity of company information.

    Rate this question:

  • 19. 

    In the context of the Discovia security and awareness training CIA stands for:

    • A.

      Confidentiality, Integrity, Availability

    • B.

      Central Intelligence Agency

    • C.

      Culinary Institute of America

    • D.

      Character, Intelligence, Agreement

    • E.

      All of the above

    Correct Answer
    A. Confidentiality, Integrity, Availability
    Explanation
    The correct answer is Confidentiality, Integrity, Availability. In the context of Discovia security and awareness training, CIA refers to these three principles. Confidentiality ensures that information is only accessible to authorized individuals. Integrity ensures that information remains accurate and unaltered. Availability ensures that information is accessible to authorized individuals when needed. This acronym is commonly used in the field of information security to emphasize the importance of these principles in protecting data and systems.

    Rate this question:

  • 20. 

    The published up-to-date policy and plan documents relevant to the company’s Information Security and Risk Management plan can be obtained from:

    • A.

      Http://DiscoNet

    • B.

      The network F:\ Drive

    • C.

      The employee handbook

    • D.

      My new hire paperwork

    • E.

      Binders conveniently located in the office

    Correct Answer
    A. Http://DiscoNet
    Explanation
    The correct answer is http://DiscoNet. This is because the question asks for the source from which the published policy and plan documents can be obtained. Among the given options, only the URL http://DiscoNet is a source that can provide the documents. The other options such as the network F:\ Drive, the employee handbook, my new hire paperwork, and binders conveniently located in the office do not specifically mention providing the published policy and plan documents.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.