Security & Compliance Quiz - 2015

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,713,877
| Attempts: 3,306 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. Jennifer and Cindy are both from the Finance Department and both belong to the "ConfidentialAccts" Email Distribution List. Jennifer accidentally shares a file on Google Drive with the "ConfidentialAccts" Distribution List. The file contained billing details of the clients Jennifer exclusively works with. Realizing what happened, what should Cindy do?

Explanation

Cindy should ask Jennifer to remove the share and report the incident to [email protected]. Even though they both have the same security clearance level, the file contained confidential information that should not have been shared with the entire distribution list. It is important to take immediate action to rectify the mistake and report it to the appropriate authorities to ensure that the incident is properly addressed and any potential security risks are mitigated.

Submit
Please wait...
About This Quiz
Security & Compliance Quiz - 2015 - Quiz

This is a short 10-minute quiz about the required Security & Compliance trainings for all Cloud Sherpas employees.
If you have not yet taken the online trainings, please... see moreclick the link below:
Synergyse Training for Google Apps
You must get a score of 100% to pass. Otherwise, you must retake the quiz until you pass.
Passing this quiz and compliance on the associated videos are counted as part of your KPI for the year 2015.
see less

2. Not all client information should be secured. Only data classified as protected information should be secured.

Explanation

This statement is incorrect. In order to maintain the privacy and security of client information, all client information should be secured, not just the data classified as protected information. Failure to secure any client information could result in breaches of privacy and potential legal consequences. Therefore, the correct answer is False.

Submit
3. You are working on data for your customer that is not covered in the list of Protected Information, can you share that with others?

Explanation

The correct answer is "No, because Cloud Sherpas considers ALL customer data to be confidential." This means that regardless of whether the data is listed as Protected Information or not, it is still considered confidential by Cloud Sherpas. Therefore, sharing the data with others without proper authorization would not be allowed.

Submit
4. Who conducts the Risk Assessment for clients of Cloud Sherpas and assigns corresponding Security Tiers for them?

Explanation

The Risk Assessment for clients of Cloud Sherpas is conducted by the Security & Compliance and Legal teams. These teams work together to assess the potential risks associated with each client and assign them corresponding Security Tiers. This ensures that the clients' security needs are properly evaluated and addressed, while also ensuring compliance with legal requirements.

Submit
5. What should you do when you recognize that a protected information is being handled by Cloud Sherpas but is only classified as Security Tier 1?

Explanation

When you recognize that a protected information is being handled by Cloud Sherpas but is only classified as Security Tier 1, the appropriate action to take is to contact [email protected] and change the Security Standard to Tier 2. This ensures that the protected information is being handled with a higher level of security and meets the necessary requirements.

Submit
6. In the videos that you watched, what is considered protected information?(SELECT ALL THAT APPLY)

Explanation

The videos consider the following information as protected: Customer Contact Numbers (Fax, Telephone, Mobile), Birth dates, admission dates, discharge dates, dates of death, Email addresses, and Account information numbers (Social Security, Health record, licenses).

Submit
7. On the training video, Customer Information, Personally Identifiable Information and Personal Data are other terms for:

Explanation

Customer Information, Personally Identifiable Information, and Personal Data are all terms used interchangeably to refer to protected information. This type of information includes any data that can be used to identify an individual, such as their name, address, social security number, or financial information. It is important to handle this information with care and ensure that it is kept secure and confidential to protect the privacy and security of individuals.

Submit
8. If the company "Sta. Ana Holdings Group" requires additional security measures for their data on top of the protections required by applicable regulations, it will be classified as:

Explanation

If the company "Sta. Ana Holdings Group" requires additional security measures for their data on top of the protections required by applicable regulations, it will be classified as Security Tier 3. This tier indicates that the company has implemented advanced security measures beyond the basic requirements, ensuring a higher level of protection for their data.

Submit
9. Armand and Jill are working on separate projects for the same client, "Acme Explosives". Jeremy, an "Acme Explosives" representative, needed Jill to analyze a stack of invoice printouts for Jill's project. With Jill on PTO, Jeremy asked Armand to hold-on to the printouts with instructions to forward them to Jill when she gets back.By agreeing with Jeremy, Armand's actions fall under:

Explanation

Armand's actions can be considered a breach in security because he agreed to hold onto the invoice printouts that were meant for Jill's project while she was on PTO. As someone working on a separate project, it is not his responsibility to handle documents outside of his own project. He should have declined taking the responsibility and asked Jeremy to find an alternative solution for forwarding the printouts to Jill.

Submit
10. Where do I find the Security Standard for my Customers in Summit?

Explanation

The security standard for customers can be found under a section on the customers' account record. This implies that within the Summit platform, there is a specific section in the customers' account record where the security standard information is located.

Submit
11. As the Project Manager, Joan should create a plan to secure the client's protected information that should include:(SELECT 3)

Explanation

As the project manager, Joan is responsible for ensuring the security of the client's protected information. To do this, she should create a plan that addresses three key aspects: where the information will be stored, who can access the information, and how the data should be destroyed. By determining where the information will be stored, Joan can ensure that it is kept in a secure location. By specifying who can access the information, she can control and limit access to authorized personnel only. Finally, by defining how the data should be destroyed, Joan can ensure that any sensitive information is properly disposed of to prevent unauthorized access.

Submit
12. Francis and Jarred are working on the same project. Jarred was given a copy of a few records from Production to simulate a possible issue experienced by an end-user. Separately, Francis had just finished his implementation and needs to have it tested.Could Francis ask Jarred for a copy of the records to conduct his tests?

Explanation

Francis should create his own data to conduct his tests because Jarred's records were given to him to simulate a possible issue experienced by an end-user, not for general testing purposes. It is important for each developer to have their own set of data to work with to ensure accurate and independent testing. Sharing data between developers can lead to confusion, dependencies, and potential issues in the testing process. Therefore, it is best practice for Francis to create his own data for testing purposes.

Submit
13. Michi was provided with an access to the client's Production environment to deploy updates to the application. Another member of her team, Kevin, was asked to reconfigure a module of the application on Production. The access given to Michi was the last license available and the client informed Kevin that it will take at least 2 weeks to acquire new licenses.Kevin was told to reconfigure the module before the end of the week. How should he proceed?

Explanation

not-available-via-ai

Submit
14. Who creates the plan for security the protected information of our customer?

Explanation

The Project Manager creates the plan for securing the protected information of our customers. As the person overseeing the project, the Project Manager is responsible for ensuring that all aspects of the project, including security measures, are properly planned and implemented. They work closely with the Security & Compliance and Legal teams to develop a comprehensive plan that addresses the specific security needs of the customer's information. This includes identifying potential risks and vulnerabilities, implementing appropriate security controls, and regularly monitoring and updating the plan as needed.

Submit
15. Select 3 examples that on their own, are considered as protected information:

Explanation

Full Name, Photograph, and Social Security Number are considered as protected information because they are personal identifiers that can be used to uniquely identify individuals. Full Name and Photograph can be used to identify someone visually, while Social Security Number is a unique identifier issued by the government for tax and employment purposes. Revealing these pieces of information without consent can lead to identity theft, fraud, or invasion of privacy.

Submit
View My Results

Quiz Review Timeline (Updated): Nov 24, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 03, 2015
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Jennifer and Cindy are both from the Finance Department and both...
Not all client information should be secured. Only data classified as...
You are working on data for your customer that is not covered in the...
Who conducts the Risk Assessment for clients of Cloud Sherpas and...
What should you do when you recognize that a protected information is...
In the videos that you watched, what is considered protected...
On the training video, Customer Information, Personally Identifiable...
If the company "Sta. Ana Holdings Group" requires additional security...
Armand and Jill are working on separate projects for the same client,...
Where do I find the Security Standard for my Customers in Summit?
As the Project Manager, Joan should create a plan to secure the...
Francis and Jarred are working on the same project. Jarred was given a...
Michi was provided with an access to the client's Production...
Who creates the plan for security the protected information of our...
Select 3 examples that on their own, are considered as protected...
Alert!

Advertisement