Security & Compliance Quiz - 2015

15 Questions | Attempts: 3285
Share

SettingsSettingsSettings
Security Quizzes & Trivia

This is a short 10-minute quiz about the required Security & Compliance trainings for all Cloud Sherpas employees. If you have not yet taken the online trainings, please click the link below: Synergyse Training for Google AppsYou must get a score of 100% to pass. Otherwise, you must retake the quiz until you pass. Passing this quiz and compliance on the associated videos are counted as part of your KPI for the year 2015.


Questions and Answers
  • 1. 
    On the training video, Customer Information, Personally Identifiable Information and Personal Data are other terms for:
    • A. 

      Protected information

    • B. 

      Private information

    • C. 

      Confidential information

    • D. 

      Transactional information

  • 2. 
    Select 3 examples that on their own, are considered as protected information:
    • A. 

      Age

    • B. 

      Criminal Record

    • C. 

      Country of Residence

    • D. 

      Full Name

    • E. 

      Gender

    • F. 

      Photograph

    • G. 

      School Attended

    • H. 

      Social Security Number

    • I. 

      Workplace

  • 3. 
    If the company “Sta. Ana Holdings Group” requires additional security measures for their data on top of the protections required by applicable regulations, it will be classified as:
    • A. 

      Security Tier 1

    • B. 

      Security Tier 2

    • C. 

      Security Tier 3

    • D. 

      Security Tier 4

  • 4. 
    As the Project Manager, Joan should create a plan to secure the client’s protected information that should include:(SELECT 3)
    • A. 

      Where the information will be stored

    • B. 

      How files should be named

    • C. 

      Who can access the information

    • D. 

      Which encoding should be used for files

    • E. 

      How the access list can be formatted

    • F. 

      How the data should be destroyed

  • 5. 
    Not all client information should be secured. Only data classified as protected information should be secured.
    • A. 

      True

    • B. 

      False

  • 6. 
    Armand and Jill are working on separate projects for the same client, “Acme Explosives”. Jeremy, an “Acme Explosives” representative, needed Jill to analyze a stack of invoice printouts for Jill’s project. With Jill on PTO, Jeremy asked Armand to hold-on to the printouts with instructions to forward them to Jill when she gets back.By agreeing with Jeremy, Armand’s actions fall under:
    • A. 

      A breach in security. He should have declined taking responsibility for documents outside his project.

    • B. 

      A security protocol exception. He can receive the documents as long as Jill was informed.

    • C. 

      A non-issue. He works with the same client as Jill and so has the same security access.

    • D. 

      A breach in security. He should have asked Jeremy to sign a receipt before accepting the documents.

  • 7. 
    Francis and Jarred are working on the same project. Jarred was given a copy of a few records from Production to simulate a possible issue experienced by an end-user. Separately, Francis had just finished his implementation and needs to have it tested.Could Francis ask Jarred for a copy of the records to conduct his tests?
    • A. 

      Yes, he should have the same security clearance as Jarred.

    • B. 

      No, he should create his own data to conduct his tests.

    • C. 

      Yes, as long as they both inform their manager first.

    • D. 

      No, he has to wait for Jarred to finish his tests first.

  • 8. 
    Jennifer and Cindy are both from the Finance Department and both belong to the “ConfidentialAccts” Email Distribution List. Jennifer accidentally shares a file on Google Drive with the “ConfidentialAccts” Distribution List. The file contained billing details of the clients Jennifer exclusively works with. Realizing what happened, what should Cindy do?
    • A. 

      Ignore the shared file. She has the same security clearance level so no harm was done.

    • B. 

      Try to remove the share. Jennifer doesn’t need to be bothered with a simple mistake like this.

    • C. 

      Ask Jennifer to remove the share. Let her revisit how and with whom the file should be shared.

    • D. 

      Ask Jennifer to remove the share and report the incident to [email protected]

  • 9. 
    Michi was provided with an access to the client’s Production environment to deploy updates to the application. Another member of her team, Kevin, was asked to reconfigure a module of the application on Production. The access given to Michi was the last license available and the client informed Kevin that it will take at least 2 weeks to acquire new licenses.Kevin was told to reconfigure the module before the end of the week. How should he proceed?
    • A. 

      Ask Michi to share the access to Production with him.

    • B. 

      Request from his manager to allow Michi to share the access to Production with him.

    • C. 

      Request an exemption from IT Security & Compliance to allow Michi to share the access with him.

    • D. 

      Defer the update to the module until a license becomes available.

    • E. 

      Escalate the situation to his manager to work it out with the client.

  • 10. 
    In the videos that you watched, what is considered protected information?(SELECT ALL THAT APPLY)
    • A. 

      Customer Contact Numbers (Fax, Telephone, Mobile)

    • B. 

      Birth dates, admission dates, discharge dates, dates of death

    • C. 

      Email addresses

    • D. 

      Account information numbers (Social Security, Health record, licenses)

  • 11. 
    Who conducts the Risk Assessment for clients of Cloud Sherpas and assigns corresponding Security Tiers for them?
    • A. 

      Myself, as a Cloud Sherpas Consultant and Security & Compliance

    • B. 

      Security & Compliance and Legal

    • C. 

      My managers and Legal

    • D. 

      Myself, as a Cloud Sherpas Consultant and Legal

  • 12. 
    What should you do when you recognize that a protected information is being handled by Cloud Sherpas but is only classified as Security Tier 1?
    • A. 

      Change the Security Standard to Tier 2

    • B. 

      Nothing, that's not my problem

    • C. 

      Contact [email protected] and change the Security Standard to Tier 2

    • D. 

      Tell my customer that they are classified as Security Tier 1 and contact [email protected] to change it to Tier 2

  • 13. 
    Where do I find the Security Standard for my Customers in Summit?
    • A. 

      Under a section on the Customers' Account Record

    • B. 

      Under the Tab Risk Assessment

    • C. 

      Beside the Account Name labelled (1, 2 or 3)

    • D. 

      Nowhere, it can be found in quality.cloudsherpas.com not Summit

  • 14. 
    You are working on data for your customer that is not covered in the list of Protected Information, can you share that with others?
    • A. 

      Yes, it is not considered Protected Information so I'm safe.

    • B. 

      No, because Cloud Sherpas considers ALL customer data to be confidential

    • C. 

      Yes, as long as I don't copy-and-paste, print screen, or print the data

    • D. 

      No, because I need to first submit a form to Security & Compliance about sharing information

  • 15. 
    Who creates the plan for security the protected information of our customer?
    • A. 

      The Project Manager

    • B. 

      The customer

    • C. 

      Myself, as a Cloud Sherpas consultant

    • D. 

      Security & Compliance and Legal

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.