Cyber Policy quiz 3

Cyber Policy quiz 3

Assessment

Quiz

Created by

Nivedita Newar

Instructional Technology

Professional Development

5 plays

Medium

Student preview

quiz-placeholder

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Zhang's business case to implement an exam proctoring software has been approved by UNSW management. He wants to understand which mandatory IT asset management requirements need to be documented from a cyber security perspective: (Select multiple correct answers)

connections and data flows to and from the service.

vulnerabilities identified and/or mitigated.

cost of storage for the system

cyber security controls, their function, and their configuration.

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Deepak has obtained approval for his business to implement a new Information Resource/Application handling highly sensitive UNSW data, hosted in UCloud-AWS). He is required to do the following: (multiple correct answers)

Review and update the information resource attribute fields in inventory on a periodic basis, as requested by cyber security team.

Evaluate the assets "Inherent Cyber Risk Rating" classification using the Cyber Security Risk Management Standard

Record the information resource in IT's central asset inventory.

Update the information resource attribute fields in the asset inventory upon asset changes, upgrades, decommissioning.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As per the "Cyber Security Standard-Information Asset Management", all UNSW Business Divisions and Faculty's "Low Cyber Risk rated Information Resources must be recorded in an inventory.

True

False

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

High Cyber Risk Rated UNSW Information Services and supporting UNSW Information Assets must be reported to the UNSW IT ________ team for recording in the central UNSW IT inventory.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Mary Grace is business owner of learning management software(LMS), classified as High Cyber Risk rated information resource. One of the software has reached end of life/support but she is insisting on continuing to use it because it has been used for more than 9 years. What is your advice to her? (multiple correct answers)

Since the LMS is currently non compliant with cyber security standards, it must be isolated from the network

that LMS must have active maintenance or support contracts with the vendors or manufacturers.

that LMS must be managed in accordance with the Cyber Security Standard – Risk Management.

that her business division must not use end-of-life and/or end-of-support Information Resources, including the LMS.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As per Cyber Security Standard-Information Asset Management, all UNSW Business Divisions and Faculty's "High Cyber Risk rated Information Resources" must be recorded in "IT's" central asset inventory

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The person responsible for defining, operating, measuring, and improving a UNSW Information Service and associated cyber security controls is called (select multiple correct answers)

Information Asset Owner

Information Service Owner

System Owner

IT service owner

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?