Security & Compliance Quiz - 2015

10 Questions | Total Attempts: 3148

SettingsSettingsSettings
Please wait...
Security Quizzes & Trivia

This is a short 10-minute quiz about the required Security & Compliance trainings for all Cloud Sherpas employees. If you have not yet taken the online trainings, please click the link below: Synergyse Training for Google AppsYou must get a score of 100% to pass. Otherwise, you must retake the quiz until you pass. Passing this quiz and compliance on the associated videos are counted as part of your KPI for the year 2015.


Questions and Answers
  • 1. 
    On the training video, Customer Information, Personally Identifiable Information and Personal Data are other terms for:
    • A. 

      Protected information

    • B. 

      Private information

    • C. 

      Confidential information

    • D. 

      Transactional information

  • 2. 
    Select 3 examples that on their own, are considered as protected information:
    • A. 

      Age

    • B. 

      Criminal Record

    • C. 

      Country of Residence

    • D. 

      Full Name

    • E. 

      Gender

    • F. 

      Photograph

    • G. 

      School Attended

    • H. 

      Social Security Number

    • I. 

      Workplace

  • 3. 
    If the company “Sta. Ana Holdings Group” requires additional security measures for their data on top of the protections required by applicable regulations, it will be classified as:
    • A. 

      Security Tier 1

    • B. 

      Security Tier 2

    • C. 

      Security Tier 3

    • D. 

      Security Tier 4

  • 4. 
    As the Project Manager, Joan should create a plan to secure the client’s protected information that should include:(SELECT 3)
    • A. 

      Where the information will be stored

    • B. 

      How files should be named

    • C. 

      Who can access the information

    • D. 

      Which encoding should be used for files

    • E. 

      How the access list can be formatted

    • F. 

      How the data should be destroyed

  • 5. 
    Not all client information should be secured. Only data classified as protected information should be secured.
    • A. 

      True

    • B. 

      False

  • 6. 
    Armand and Jill are working on separate projects for the same client, “Acme Explosives”. Jeremy, an “Acme Explosives” representative, needed Jill to analyze a stack of invoice printouts for Jill’s project. With Jill on PTO, Jeremy asked Armand to hold-on to the printouts with instructions to forward them to Jill when she gets back.By agreeing with Jeremy, Armand’s actions fall under:
    • A. 

      A breach in security. He should have declined taking responsibility for documents outside his project.

    • B. 

      A security protocol exception. He can receive the documents as long as Jill was informed.

    • C. 

      A non-issue. He works with the same client as Jill and so has the same security access.

    • D. 

      A breach in security. He should have asked Jeremy to sign a receipt before accepting the documents.

  • 7. 
    Francis and Jarred are working on the same project. Jarred was given a copy of a few records from Production to simulate a possible issue experienced by an end-user. Separately, Francis had just finished his implementation and needs to have it tested.Could Francis ask Jarred for a copy of the records to conduct his tests?
    • A. 

      Yes, he should have the same security clearance as Jarred.

    • B. 

      No, he should create his own data to conduct his tests.

    • C. 

      Yes, as long as they both inform their manager first.

    • D. 

      No, he has to wait for Jarred to finish his tests first.

  • 8. 
    Jennifer and Cindy are both from the Finance Department and both belong to the “ConfidentialAccts” Email Distribution List. Jennifer accidentally shares a file on Google Drive with the “ConfidentialAccts” Distribution List. The file contained billing details of the clients Jennifer exclusively works with. Realizing what happened, what should Cindy do?
    • A. 

      Ignore the shared file. She has the same security clearance level so no harm was done.

    • B. 

      Try to remove the share. Jennifer doesn’t need to be bothered with a simple mistake like this.

    • C. 

      Ask Jennifer to remove the share. Let her revisit how and with whom the file should be shared.

    • D. 

      Ask Jennifer to remove the share and report the incident to [email protected]

  • 9. 
    Michi was provided with an access to the client’s Production environment to deploy updates to the application. Another member of her team, Kevin, was asked to reconfigure a module of the application on Production. The access given to Michi was the last license available and the client informed Kevin that it will take at least 2 weeks to acquire new licenses.Kevin was told to reconfigure the module before the end of the week. How should he proceed?
    • A. 

      Ask Michi to share the access to Production with him.

    • B. 

      Request from his manager to allow Michi to share the access to Production with him.

    • C. 

      Request an exemption from IT Security & Compliance to allow Michi to share the access with him.

    • D. 

      Defer the update to the module until a license becomes available.

    • E. 

      Escalate the situation to his manager to work it out with the client.

  • 10. 
    In the videos that you watched, what is considered protected information?(SELECT ALL THAT APPLY)
    • A. 

      Customer Contact Numbers (Fax, Telephone, Mobile)

    • B. 

      Birth dates, admission dates, discharge dates, dates of death

    • C. 

      Email addresses

    • D. 

      Account information numbers (Social Security, Health record, licenses)

Back to Top Back to top