Sie sind auf Seite 1von 14

09/08/2019 Assessment

Home / My courses / ISMS19 / Assessment / Assessment

Started on Friday, 9 August 2019, 11:09 PM


State Finished
Completed on Friday, 9 August 2019, 11:29 PM
Time taken 19 mins 23 secs
Marks 18.00/25.00
Grade 7.20 out of 10.00 (72%)
Feedback Please redo the module and retake the assessment to complete the
course.

Question 1

Correct

Mark 1.00 out of 1.00

Which of the following options are ALL Business Continuity events?

Select one:
a. Flood, fire, Civil Strikes

b. Desktop/Laptop failure on production area

c. Limited food available in Canteen

d. None of the Above

Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 1/14
09/08/2019 Assessment

Question 2

Correct

Mark 1.00 out of 1.00

A visitor would like to connect to your WiFi guest network, what should be done?

Select one:
a. Give him/her the WiFi code and grant them access

b. Confirm that the visitor's system is protected by Antivirus and then grant them access
to the WiFi network

c. Apologize and explain that this access is ONLY for privileged visitors

d. All of the above

Your answer is correct.

Question 3

Correct

Mark 1.00 out of 1.00

What are the benefits of business continuity management system?

Select one:
a. Is able to proactively identify the impacts of an operational disruption

b. Has in place an effective response to disruptions which minimizes the impact on the
organization

c. Maintains an ability to manage risks

d. All of the above


Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 2/14
09/08/2019 Assessment

Question 4

Incorrect

Mark 0.00 out of 1.00

What is a continuity strategy?

Select one:
a. Method for determining the strategic direction of the business continuity programme

b. A workaround for a product or service to be used during disruption

c. A strategy for reducing likelihood of risk to operations

d. A strategy to protect all products and services

Your answer is incorrect.

Question 5

Incorrect

Mark 0.00 out of 1.00

Junk e-mail, as in mass mailings, is annoying but harmless

Select one:
True 

False

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 3/14
09/08/2019 Assessment

Question 6

Correct

Mark 1.00 out of 1.00

When should the BCP be reviewed?

Select one:
a. Whenever the company gets audited

b. Whenever encountering a disaster

c. Whenever the legal department declares it is time

d. At least annually or whenever significant changes occur


Your answer is correct.

Question 7

Correct

Mark 1.00 out of 1.00

If you are installing new software for your department, which of the following is not required?

Select one:
a. Notifying the IT dept. about any backup and recovery procedures that are required or
are provided by the vendor

b. Following the password security requirements detailed in the Information Security


Policy

c. Notifying the IT department about the system and who will be its administrator

d. Performing an annual review of access to ensure terminated employees have been


removed

Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 4/14
09/08/2019 Assessment

Question 8

Correct

Mark 1.00 out of 1.00

Why is it important to have a good understanding of Information Security policies and


procedures?

Select one:
a. All of the above

b. Helps to understand levels of responsibility

c. Helps protect individuals from being victims of security incidents.

d. Provides an understanding of steps to follow in the event of a security incident

Your answer is correct.

Question 9

Correct

Mark 1.00 out of 1.00

HIPAA is –

Select one:
a. Health Insurance Portability & Accountability Act of 1996

b. Health insurance probability & Accountability Act of 1996

c. Health insurance Probability & Availability Act of 1996

d. None of the above

Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 5/14
09/08/2019 Assessment

Question 10

Correct

Mark 1.00 out of 1.00

Which of the following is a proper use of email?

Select one:
a. Send an email to all your friends and co-workers to advertise a job opening in your
area

b. Never email personal information



c. Send out pricelists for your home-based business products

d. Forward inspirational and humorous emails to your co-workers to brighten their day

Your answer is correct.

Question 11

Incorrect

Mark 0.00 out of 1.00

The technique in which an attacker convinces an authorized user to pass classified information
to an unauthorized person is called

Select one:
a. Dumpster diving

b. Social engineering

c. Tailgating

d. None of the above

Your answer is incorrect.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 6/14
09/08/2019 Assessment

Question 12

Correct

Mark 1.00 out of 1.00

How often will your company request your password or account name in email?

Select one:
a. Once every six months

b. Once a year

c. Never

d. Once a month

Your answer is correct.

Question 13

Correct

Mark 1.00 out of 1.00

What are your responsibilities for the protection of company assets?

Select one:
a. Assist with the protection and proper use of information assets

b. Know the processes to protect information assets

c. Build proper security practices into your day

d. All of the above


Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 7/14
09/08/2019 Assessment

Question 14

Correct

Mark 1.00 out of 1.00

What is the consequences on an employee after a security incident is raised on him

Select one:
a. Disciplinary action would be taken

b. Termination

c. Legal action

d. All of the above


Your answer is correct.

Question 15

Correct

Mark 1.00 out of 1.00

The best way to avoid viruses is to not open unexpected e-mail attachments from unknown
sources.

Select one:
True 

False

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 8/14
09/08/2019 Assessment

Question 16

Incorrect

Mark 0.00 out of 1.00

Phishing is an attempt to acquire sensitive information from an individual through. Select the
best answer.

Select one:
a. Email

b. Malicious website

c. Social networking site

d. All of the above

Your answer is incorrect.

Question 17

Correct

Mark 1.00 out of 1.00

Which of the following is the proper way of using software?

Select one:
a. Use software from untrustworthy or doubtful sources

b. Apply patches to popular software only

c. Download programs without permission of the copyright owner

d. Use software according to license terms and agreements


Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 9/14
09/08/2019 Assessment

Question 18

Correct

Mark 1.00 out of 1.00

The primary mission of an information security program is to ensure confidentiality, integrity and
availability of the information.

Select one:
True 

False

Question 19

Correct

Mark 1.00 out of 1.00

What does the abbreviation 'PCI DSS' stand for?

Select one:
a. Personal Computer Information Data Systems Security

b. Payment Card Industry Data Security Standards



c. Privacy of Cardholder Information Data Security Systems

d. Property Casualty Insurers Defense Security Service

Your answer is correct.

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 10/14
09/08/2019 Assessment

Question 20

Incorrect

Mark 0.00 out of 1.00

Retrieving information from trash is called...

Select one:
a. Dumpster Diving

b. Shoulder Surfing

c. Tailgating

d. None of the above

Your answer is incorrect.

Question 21

Incorrect

Mark 0.00 out of 1.00

Bandwidth is not affected by downloading files from the Internet to your PC.

Select one:
True 

False

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 11/14
09/08/2019 Assessment

Question 22

Correct

Mark 1.00 out of 1.00

What is PII?

Select one:
a. Personally Identifiable Information

b. Personality Identification of Individual

c. Professional indemnity insurance

d. None of the above

Your answer is correct.

Question 23

Incorrect

Mark 0.00 out of 1.00

Anti virus software is the only most effective product/service/practice against malicious code

Select one:
True 

False

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 12/14
09/08/2019 Assessment

Question 24

Correct

Mark 1.00 out of 1.00

What is Type 1 audit?

Select one:
a. The auditor reviews and reports on the service organization’s system and the design of
its controls, relating to one or all of the five Trust Services Criteria (TSC)

b. Features the auditor’s assessment that a service organization’s controls have been
tested for operational effectiveness over a period of time

c. All the above

Your answer is correct.

Question 25

Correct

Mark 1.00 out of 1.00

What are the Three Components of Title II which is most often associated with HIPAA
Compliance

Select one:
a. Privacy, Standardization of electronic patient health, confidentiality

b. Privacy, Security, Standardization of electronic patient health



c. Privacy, Integrity, Security

Your answer is correct.

◄ Presentation Jump to...

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 13/14
09/08/2019 Assessment

https://gtp.csscorp.com/mod/quiz/review.php?attempt=26992 14/14

Das könnte Ihnen auch gefallen