Security & Compliance Quiz - 2015

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1384 | Total Attempts: 6,207,421
Questions: 15 | Attempts: 3,297

SettingsSettingsSettings
Security & Compliance Quiz - 2015 - Quiz

This is a short 10-minute quiz about the required Security & Compliance trainings for all Cloud Sherpas employees.
If you have not yet taken the online trainings, please click the link below:
Synergyse Training for Google Apps
You must get a score of 100% to pass. Otherwise, you must retake the quiz until you pass.
Passing this quiz and compliance on the associated videos are counted as part of your KPI for the year 2015.


Questions and Answers
  • 1. 

    On the training video, Customer Information, Personally Identifiable Information and Personal Data are other terms for:

    • A.

      Protected information

    • B.

      Private information

    • C.

      Confidential information

    • D.

      Transactional information

    Correct Answer
    A. Protected information
    Explanation
    Customer Information, Personally Identifiable Information, and Personal Data are all terms used interchangeably to refer to protected information. This type of information includes any data that can be used to identify an individual, such as their name, address, social security number, or financial information. It is important to handle this information with care and ensure that it is kept secure and confidential to protect the privacy and security of individuals.

    Rate this question:

  • 2. 

    Select 3 examples that on their own, are considered as protected information:

    • A.

      Age

    • B.

      Criminal Record

    • C.

      Country of Residence

    • D.

      Full Name

    • E.

      Gender

    • F.

      Photograph

    • G.

      School Attended

    • H.

      Social Security Number

    • I.

      Workplace

    Correct Answer(s)
    D. Full Name
    F. pHotograpH
    H. Social Security Number
    Explanation
    Full Name, Photograph, and Social Security Number are considered as protected information because they are personal identifiers that can be used to uniquely identify individuals. Full Name and Photograph can be used to identify someone visually, while Social Security Number is a unique identifier issued by the government for tax and employment purposes. Revealing these pieces of information without consent can lead to identity theft, fraud, or invasion of privacy.

    Rate this question:

  • 3. 

    If the company “Sta. Ana Holdings Group” requires additional security measures for their data on top of the protections required by applicable regulations, it will be classified as:

    • A.

      Security Tier 1

    • B.

      Security Tier 2

    • C.

      Security Tier 3

    • D.

      Security Tier 4

    Correct Answer
    C. Security Tier 3
    Explanation
    If the company "Sta. Ana Holdings Group" requires additional security measures for their data on top of the protections required by applicable regulations, it will be classified as Security Tier 3. This tier indicates that the company has implemented advanced security measures beyond the basic requirements, ensuring a higher level of protection for their data.

    Rate this question:

  • 4. 

    As the Project Manager, Joan should create a plan to secure the client’s protected information that should include:(SELECT 3)

    • A.

      Where the information will be stored

    • B.

      How files should be named

    • C.

      Who can access the information

    • D.

      Which encoding should be used for files

    • E.

      How the access list can be formatted

    • F.

      How the data should be destroyed

    Correct Answer(s)
    A. Where the information will be stored
    C. Who can access the information
    F. How the data should be destroyed
    Explanation
    As the project manager, Joan is responsible for ensuring the security of the client's protected information. To do this, she should create a plan that addresses three key aspects: where the information will be stored, who can access the information, and how the data should be destroyed. By determining where the information will be stored, Joan can ensure that it is kept in a secure location. By specifying who can access the information, she can control and limit access to authorized personnel only. Finally, by defining how the data should be destroyed, Joan can ensure that any sensitive information is properly disposed of to prevent unauthorized access.

    Rate this question:

  • 5. 

    Not all client information should be secured. Only data classified as protected information should be secured.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is incorrect. In order to maintain the privacy and security of client information, all client information should be secured, not just the data classified as protected information. Failure to secure any client information could result in breaches of privacy and potential legal consequences. Therefore, the correct answer is False.

    Rate this question:

  • 6. 

    Armand and Jill are working on separate projects for the same client, “Acme Explosives”. Jeremy, an “Acme Explosives” representative, needed Jill to analyze a stack of invoice printouts for Jill’s project. With Jill on PTO, Jeremy asked Armand to hold-on to the printouts with instructions to forward them to Jill when she gets back.By agreeing with Jeremy, Armand’s actions fall under:

    • A.

      A breach in security. He should have declined taking responsibility for documents outside his project.

    • B.

      A security protocol exception. He can receive the documents as long as Jill was informed.

    • C.

      A non-issue. He works with the same client as Jill and so has the same security access.

    • D.

      A breach in security. He should have asked Jeremy to sign a receipt before accepting the documents.

    Correct Answer
    A. A breach in security. He should have declined taking responsibility for documents outside his project.
    Explanation
    Armand's actions can be considered a breach in security because he agreed to hold onto the invoice printouts that were meant for Jill's project while she was on PTO. As someone working on a separate project, it is not his responsibility to handle documents outside of his own project. He should have declined taking the responsibility and asked Jeremy to find an alternative solution for forwarding the printouts to Jill.

    Rate this question:

  • 7. 

    Francis and Jarred are working on the same project. Jarred was given a copy of a few records from Production to simulate a possible issue experienced by an end-user. Separately, Francis had just finished his implementation and needs to have it tested.Could Francis ask Jarred for a copy of the records to conduct his tests?

    • A.

      Yes, he should have the same security clearance as Jarred.

    • B.

      No, he should create his own data to conduct his tests.

    • C.

      Yes, as long as they both inform their manager first.

    • D.

      No, he has to wait for Jarred to finish his tests first.

    Correct Answer
    B. No, he should create his own data to conduct his tests.
    Explanation
    Francis should create his own data to conduct his tests because Jarred's records were given to him to simulate a possible issue experienced by an end-user, not for general testing purposes. It is important for each developer to have their own set of data to work with to ensure accurate and independent testing. Sharing data between developers can lead to confusion, dependencies, and potential issues in the testing process. Therefore, it is best practice for Francis to create his own data for testing purposes.

    Rate this question:

  • 8. 

    Jennifer and Cindy are both from the Finance Department and both belong to the “ConfidentialAccts” Email Distribution List. Jennifer accidentally shares a file on Google Drive with the “ConfidentialAccts” Distribution List. The file contained billing details of the clients Jennifer exclusively works with. Realizing what happened, what should Cindy do?

    • A.

      Ignore the shared file. She has the same security clearance level so no harm was done.

    • B.

      Try to remove the share. Jennifer doesn’t need to be bothered with a simple mistake like this.

    • C.

      Ask Jennifer to remove the share. Let her revisit how and with whom the file should be shared.

    • D.

      Ask Jennifer to remove the share and report the incident to [email protected].

    Correct Answer
    D. Ask Jennifer to remove the share and report the incident to [email protected].
    Explanation
    Cindy should ask Jennifer to remove the share and report the incident to [email protected]. Even though they both have the same security clearance level, the file contained confidential information that should not have been shared with the entire distribution list. It is important to take immediate action to rectify the mistake and report it to the appropriate authorities to ensure that the incident is properly addressed and any potential security risks are mitigated.

    Rate this question:

  • 9. 

    Michi was provided with an access to the client’s Production environment to deploy updates to the application. Another member of her team, Kevin, was asked to reconfigure a module of the application on Production. The access given to Michi was the last license available and the client informed Kevin that it will take at least 2 weeks to acquire new licenses.Kevin was told to reconfigure the module before the end of the week. How should he proceed?

    • A.

      Ask Michi to share the access to Production with him.

    • B.

      Request from his manager to allow Michi to share the access to Production with him.

    • C.

      Request an exemption from IT Security & Compliance to allow Michi to share the access with him.

    • D.

      Defer the update to the module until a license becomes available.

    • E.

      Escalate the situation to his manager to work it out with the client.

    Correct Answer
    E. Escalate the situation to his manager to work it out with the client.
  • 10. 

    In the videos that you watched, what is considered protected information?(SELECT ALL THAT APPLY)

    • A.

      Customer Contact Numbers (Fax, Telephone, Mobile)

    • B.

      Birth dates, admission dates, discharge dates, dates of death

    • C.

      Email addresses

    • D.

      Account information numbers (Social Security, Health record, licenses)

    Correct Answer(s)
    A. Customer Contact Numbers (Fax, TelepHone, Mobile)
    B. Birth dates, admission dates, discharge dates, dates of death
    C. Email addresses
    D. Account information numbers (Social Security, Health record, licenses)
    Explanation
    The videos consider the following information as protected: Customer Contact Numbers (Fax, Telephone, Mobile), Birth dates, admission dates, discharge dates, dates of death, Email addresses, and Account information numbers (Social Security, Health record, licenses).

    Rate this question:

  • 11. 

    Who conducts the Risk Assessment for clients of Cloud Sherpas and assigns corresponding Security Tiers for them?

    • A.

      Myself, as a Cloud Sherpas Consultant and Security & Compliance

    • B.

      Security & Compliance and Legal

    • C.

      My managers and Legal

    • D.

      Myself, as a Cloud Sherpas Consultant and Legal

    Correct Answer
    B. Security & Compliance and Legal
    Explanation
    The Risk Assessment for clients of Cloud Sherpas is conducted by the Security & Compliance and Legal teams. These teams work together to assess the potential risks associated with each client and assign them corresponding Security Tiers. This ensures that the clients' security needs are properly evaluated and addressed, while also ensuring compliance with legal requirements.

    Rate this question:

  • 12. 

    What should you do when you recognize that a protected information is being handled by Cloud Sherpas but is only classified as Security Tier 1?

    • A.

      Change the Security Standard to Tier 2

    • B.

      Nothing, that's not my problem

    • C.

      Contact [email protected] and change the Security Standard to Tier 2

    • D.

      Tell my customer that they are classified as Security Tier 1 and contact [email protected] to change it to Tier 2

    Correct Answer
    C. Contact [email protected] and change the Security Standard to Tier 2
    Explanation
    When you recognize that a protected information is being handled by Cloud Sherpas but is only classified as Security Tier 1, the appropriate action to take is to contact [email protected] and change the Security Standard to Tier 2. This ensures that the protected information is being handled with a higher level of security and meets the necessary requirements.

    Rate this question:

  • 13. 

    Where do I find the Security Standard for my Customers in Summit?

    • A.

      Under a section on the Customers' Account Record

    • B.

      Under the Tab Risk Assessment

    • C.

      Beside the Account Name labelled (1, 2 or 3)

    • D.

      Nowhere, it can be found in quality.cloudsherpas.com not Summit

    Correct Answer
    A. Under a section on the Customers' Account Record
    Explanation
    The security standard for customers can be found under a section on the customers' account record. This implies that within the Summit platform, there is a specific section in the customers' account record where the security standard information is located.

    Rate this question:

  • 14. 

    You are working on data for your customer that is not covered in the list of Protected Information, can you share that with others?

    • A.

      Yes, it is not considered Protected Information so I'm safe.

    • B.

      No, because Cloud Sherpas considers ALL customer data to be confidential

    • C.

      Yes, as long as I don't copy-and-paste, print screen, or print the data

    • D.

      No, because I need to first submit a form to Security & Compliance about sharing information

    Correct Answer
    B. No, because Cloud Sherpas considers ALL customer data to be confidential
    Explanation
    The correct answer is "No, because Cloud Sherpas considers ALL customer data to be confidential." This means that regardless of whether the data is listed as Protected Information or not, it is still considered confidential by Cloud Sherpas. Therefore, sharing the data with others without proper authorization would not be allowed.

    Rate this question:

  • 15. 

    Who creates the plan for security the protected information of our customer?

    • A.

      The Project Manager

    • B.

      The customer

    • C.

      Myself, as a Cloud Sherpas consultant

    • D.

      Security & Compliance and Legal

    Correct Answer
    A. The Project Manager
    Explanation
    The Project Manager creates the plan for securing the protected information of our customers. As the person overseeing the project, the Project Manager is responsible for ensuring that all aspects of the project, including security measures, are properly planned and implemented. They work closely with the Security & Compliance and Legal teams to develop a comprehensive plan that addresses the specific security needs of the customer's information. This includes identifying potential risks and vulnerabilities, implementing appropriate security controls, and regularly monitoring and updating the plan as needed.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 03, 2015
    Quiz Created by
    Catherine Halcomb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.