
Cyber Policy Quiz 2

Quiz
•
Instructional Technology
•
Professional Development
•
Medium

Nivedita Newar
Used 5+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Rosaline is implementing a solution in Faculty of Engineering which is a 30 million dollar project. She is performing a high level business case and wants to incorporate cyber security principles in the planning. Which 2 principles should she focus on? (select two correct options)
UNSW Information Resources must be designed, deployed, maintained, and decommissioned according to their cyber security risk and any associated control requirements
All access to UNSW Information Resources must be authorised, restricted based on need, and periodical review is not required
Cyber security incidents must be identified, reported, contained, eradicated, and recovered from, in a timely manner
Business continuity and disaster recovery plans must be developed, documented, and enacted when required and may allow acceptable increase in cyber security risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many levels of Cyber Security Risk Rating exists for UNSW Information Resources, derived from inherent risk as per the UNSW Cyber Security Risk Framework?
3
4
2
5
3.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
Which of the following UNSW Information Resource types delivered by a vendor are covered by the Cyber Security Risk Management Standard?
Endpoints (workstations, laptops, mobiles, IoT and VDI)
Data Services and Storage Services (including PaaS).
Networks and Network Devices (including SDN and Cloud).
Research journals
Classroom whiteboard
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Who has UNSW-wide authority to establish mandatory Cyber Security Standards and Guidelines and determine the consultation process (in accordance with the UNSW Policy Framework Policy),
Chief Information Officer
Chief Information Security Officer
Vice- Chancellor
VP, Operations
5.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
The Chief Information Security Officer has UNSW-wide accountability and authority for:
assign UNSW-wide management responsibilities for cyber security
the design, implementation, and oversight of UNSW cyber security strategy, plans, programs, capabilities, and controls
supporting UNSW management in identification, assessment, treatment, and reporting of cyber security risks.
ensuring the Cyber Security Policy, Cyber Security Standards and Cyber Security Guidelines conform with the requirements of any relevant International Standard and its defined scope within UNSW.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
As per the Cyber Security Policy Deputy Vice-Chancellors, Vice-Presidents, Deans, and the Rector UNSW Canberra are accountable for the:
identification and management of cyber security risk within their area of accountability, including where necessary obtaining guidance and support from the Chief Information Security Officer.
assignment of Business Owners for all UNSW Information Resources within their area of accountability.
annual attestation of compliance to the Cyber Security Risk Management Framework, for High Cyber Security Risk Rated UNSW Information Resources within their area of accountability, in accordance with the Cyber Security Standard – Risk Management, and where necessary obtaining guidance and support from the Chief Information Security Officer.
All of the above
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
John is a business owner trying to implement an AI tool in the Finance division. What is John responsible for? (multiple correct answers)
ensuring all UNSW Information Resources within their area of responsibility have Cyber Security Risk determined
no need for reporting and escalating identified cyber security risks in accordance with the Cyber Security Standard – Risk Management.
overseeing all access to UNSW Information Resources within their area of responsibility in accordance with the Cyber Security Standard – Identity and Access Management.
ensuring UNSW Information Resources within their area of responsibility are compliant with all applicable cyber security laws and regulations, including those relating to critical infrastructure
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
PWCS Data Security and Compliance Quiz

Quiz
•
Professional Development
25 questions
Basic Cybersecurity Concepts 1

Quiz
•
Professional Development
20 questions
Security+ Cengage Module6: Mobile and Embedded Device Security

Quiz
•
Professional Development
21 questions
Connecting to the Internet

Quiz
•
Professional Development
15 questions
AI Proof Assignment

Quiz
•
Professional Development
20 questions
Syukuran HUT Jalin ke 6

Quiz
•
Professional Development
20 questions
Azure Review

Quiz
•
Professional Development
15 questions
SNAF Quiz 3

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Instructional Technology
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development