Rosaline is implementing a solution in Faculty of Engineering which is a 30 million dollar project. She is performing a high level business case and wants to incorporate cyber security principles in the planning. Which 2 principles should she focus on? (select two correct options)

Cyber Policy Quiz 2

Quiz
•
Instructional Technology
•
Professional Development
•
Medium

Nivedita Newar
Used 5+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
UNSW Information Resources must be designed, deployed, maintained, and decommissioned according to their cyber security risk and any associated control requirements
All access to UNSW Information Resources must be authorised, restricted based on need, and periodical review is not required
Cyber security incidents must be identified, reported, contained, eradicated, and recovered from, in a timely manner
Business continuity and disaster recovery plans must be developed, documented, and enacted when required and may allow acceptable increase in cyber security risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many levels of Cyber Security Risk Rating exists for UNSW Information Resources, derived from inherent risk as per the UNSW Cyber Security Risk Framework?
3
4
2
5
3.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
Which of the following UNSW Information Resource types delivered by a vendor are covered by the Cyber Security Risk Management Standard?
Endpoints (workstations, laptops, mobiles, IoT and VDI)
Data Services and Storage Services (including PaaS).
Networks and Network Devices (including SDN and Cloud).
Research journals
Classroom whiteboard
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Who has UNSW-wide authority to establish mandatory Cyber Security Standards and Guidelines and determine the consultation process (in accordance with the UNSW Policy Framework Policy),
Chief Information Officer
Chief Information Security Officer
Vice- Chancellor
VP, Operations
5.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
The Chief Information Security Officer has UNSW-wide accountability and authority for:
assign UNSW-wide management responsibilities for cyber security
the design, implementation, and oversight of UNSW cyber security strategy, plans, programs, capabilities, and controls
supporting UNSW management in identification, assessment, treatment, and reporting of cyber security risks.
ensuring the Cyber Security Policy, Cyber Security Standards and Cyber Security Guidelines conform with the requirements of any relevant International Standard and its defined scope within UNSW.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
As per the Cyber Security Policy Deputy Vice-Chancellors, Vice-Presidents, Deans, and the Rector UNSW Canberra are accountable for the:
identification and management of cyber security risk within their area of accountability, including where necessary obtaining guidance and support from the Chief Information Security Officer.
assignment of Business Owners for all UNSW Information Resources within their area of accountability.
annual attestation of compliance to the Cyber Security Risk Management Framework, for High Cyber Security Risk Rated UNSW Information Resources within their area of accountability, in accordance with the Cyber Security Standard – Risk Management, and where necessary obtaining guidance and support from the Chief Information Security Officer.
All of the above
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
John is a business owner trying to implement an AI tool in the Finance division. What is John responsible for? (multiple correct answers)
ensuring all UNSW Information Resources within their area of responsibility have Cyber Security Risk determined
no need for reporting and escalating identified cyber security risks in accordance with the Cyber Security Standard – Risk Management.
overseeing all access to UNSW Information Resources within their area of responsibility in accordance with the Cyber Security Standard – Identity and Access Management.
ensuring UNSW Information Resources within their area of responsibility are compliant with all applicable cyber security laws and regulations, including those relating to critical infrastructure
Create a free account and access millions of resources
Similar Resources on Quizizz
18 questions
unit 201: Health and safety and welfare in construction

Quiz
•
Professional Development
15 questions
Cyber Security Quiz

Quiz
•
Professional Development
20 questions
ISO/IEC 27001:2022

Quiz
•
Professional Development
23 questions
Cyber Policy Quiz 1

Quiz
•
Professional Development
20 questions
Cyber Policy quiz 4

Quiz
•
Professional Development
17 questions
6219 unit 101 H&S revision

Quiz
•
Professional Development
20 questions
ISMS Assessment

Quiz
•
Professional Development
18 questions
its the future

Quiz
•
8th Grade - Professio...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade