Cyber Policy Quiz 2

Cyber Policy Quiz 2

Professional Development

20 Qs

quiz-placeholder

Similar activities

Final exam questions

Final exam questions

Professional Development

15 Qs

6219 unit 101 H&S revision

6219 unit 101 H&S revision

Professional Development

17 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

ISMS Assessment

ISMS Assessment

Professional Development

20 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

Cyber Policy Quiz 1

Cyber Policy Quiz 1

Professional Development

23 Qs

Cyber Policy quiz 3

Cyber Policy quiz 3

Professional Development

25 Qs

CySa+ PT 4: 3/3

CySa+ PT 4: 3/3

9th Grade - Professional Development

18 Qs

Cyber Policy Quiz 2

Cyber Policy Quiz 2

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Nivedita Newar

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

Rosaline is implementing a solution in Faculty of Engineering which is a 30 million dollar project. She is performing a high level business case and wants to incorporate cyber security principles in the planning. Which 2 principles should she focus on? (select two correct options)

UNSW Information Resources must be designed, deployed, maintained, and decommissioned according to their cyber security risk and any associated control requirements

All access to UNSW Information Resources must be authorised, restricted based on need, and periodical review is not required

Cyber security incidents must be identified, reported, contained, eradicated, and recovered from, in a timely manner

Business continuity and disaster recovery plans must be developed, documented, and enacted when required and may allow acceptable increase in cyber security risk

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many levels of Cyber Security Risk Rating exists for UNSW Information Resources, derived from inherent risk as per the UNSW Cyber Security Risk Framework?

3

4

2

5

3.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which of the following UNSW Information Resource types delivered by a vendor are covered by the Cyber Security Risk Management Standard?

Endpoints (workstations, laptops, mobiles, IoT and VDI)

Data Services and Storage Services (including PaaS).

Networks and Network Devices (including SDN and Cloud).

Research journals

Classroom whiteboard

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Who has UNSW-wide authority to establish mandatory Cyber Security Standards and Guidelines and determine the consultation process (in accordance with the UNSW Policy Framework Policy),

Chief Information Officer

Chief Information Security Officer

Vice- Chancellor

VP, Operations

5.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

The Chief Information Security Officer has UNSW-wide accountability and authority for:

assign UNSW-wide management responsibilities for cyber security

the design, implementation, and oversight of UNSW cyber security strategy, plans, programs, capabilities, and controls

supporting UNSW management in identification, assessment, treatment, and reporting of cyber security risks.

ensuring the Cyber Security Policy, Cyber Security Standards and Cyber Security Guidelines conform with the requirements of any relevant International Standard and its defined scope within UNSW.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As per the Cyber Security Policy Deputy Vice-Chancellors, Vice-Presidents, Deans, and the Rector UNSW Canberra are accountable for the:

identification and management of cyber security risk within their area of accountability, including where necessary obtaining guidance and support from the Chief Information Security Officer.

assignment of Business Owners for all UNSW Information Resources within their area of accountability.

annual attestation of compliance to the Cyber Security Risk Management Framework, for High Cyber Security Risk Rated UNSW Information Resources within their area of accountability, in accordance with the Cyber Security Standard – Risk Management, and where necessary obtaining guidance and support from the Chief Information Security Officer.

All of the above

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

John is a business owner trying to implement an AI tool in the Finance division. What is John responsible for? (multiple correct answers)

ensuring all UNSW Information Resources within their area of responsibility have Cyber Security Risk determined

no need for reporting and escalating identified cyber security risks in accordance with the Cyber Security Standard – Risk Management.

overseeing all access to UNSW Information Resources within their area of responsibility in accordance with the Cyber Security Standard – Identity and Access Management.

ensuring UNSW Information Resources within their area of responsibility are compliant with all applicable cyber security laws and regulations, including those relating to critical infrastructure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?