Cyber Policy quiz 3

Cyber Policy quiz 3

Professional Development

β€’

25 Qs

quiz-placeholder

Similar activities

Bem-vindo ao mundo do social media, vocΓͺ vai adorar! 🌈

Bem-vindo ao mundo do social media, vocΓͺ vai adorar! 🌈

Professional Development

β€’

20 Qs

Google Professional Architect 3 - 41 to 60

Google Professional Architect 3 - 41 to 60

Professional Development

β€’

20 Qs

 Digital Instrucstional Materials

Digital Instrucstional Materials

Professional Development

β€’

20 Qs

AWS SAA - 17

AWS SAA - 17

Professional Development

β€’

20 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

β€’

20 Qs

Threats and Attacks (Sec+)

Threats and Attacks (Sec+)

Professional Development

β€’

26 Qs

KBA

KBA

KG - Professional Development

β€’

20 Qs

SecurityTraining

SecurityTraining

Professional Development

β€’

20 Qs

Cyber Policy quiz 3

Cyber Policy quiz 3

Assessment

Quiz

β€’

Instructional Technology

β€’

Professional Development

β€’

Medium

Created by

Nivedita Newar

Used 5+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min β€’ 1 pt

Zhang's business case to implement an exam proctoring software has been approved by UNSW management. He wants to understand which mandatory IT asset management requirements need to be documented from a cyber security perspective: (Select multiple correct answers)

connections and data flows to and from the service.

vulnerabilities identified and/or mitigated.

cost of storage for the system

cyber security controls, their function, and their configuration.

2.

MULTIPLE SELECT QUESTION

1 min β€’ 1 pt

Deepak has obtained approval for his business to implement a new Information Resource/Application handling highly sensitive UNSW data, hosted in UCloud-AWS). He is required to do the following: (multiple correct answers)

Review and update the information resource attribute fields in inventory on a periodic basis, as requested by cyber security team.

Evaluate the assets "Inherent Cyber Risk Rating" classification using the Cyber Security Risk Management Standard

Record the information resource in IT's central asset inventory.

Update the information resource attribute fields in the asset inventory upon asset changes, upgrades, decommissioning.

3.

MULTIPLE CHOICE QUESTION

30 sec β€’ 1 pt

As per the "Cyber Security Standard-Information Asset Management", all UNSW Business Divisions and Faculty's "Low Cyber Risk rated Information Resources must be recorded in an inventory.

True

False

4.

FILL IN THE BLANK QUESTION

1 min β€’ 1 pt

High Cyber Risk Rated UNSW Information Services and supporting UNSW Information Assets must be reported to the UNSW IT ________ team for recording in the central UNSW IT inventory.

5.

MULTIPLE SELECT QUESTION

1 min β€’ 1 pt

Mary Grace is business owner of learning management software(LMS), classified as High Cyber Risk rated information resource. One of the software has reached end of life/support but she is insisting on continuing to use it because it has been used for more than 9 years. What is your advice to her? (multiple correct answers)

Since the LMS is currently non compliant with cyber security standards, it must be isolated from the network

that LMS must have active maintenance or support contracts with the vendors or manufacturers.

that LMS must be managed in accordance with the Cyber Security Standard – Risk Management.

that her business division must not use end-of-life and/or end-of-support Information Resources, including the LMS.

6.

MULTIPLE CHOICE QUESTION

30 sec β€’ 1 pt

As per Cyber Security Standard-Information Asset Management, all UNSW Business Divisions and Faculty's "High Cyber Risk rated Information Resources" must be recorded in "IT's" central asset inventory

True

False

7.

MULTIPLE SELECT QUESTION

45 sec β€’ 1 pt

The person responsible for defining, operating, measuring, and improving a UNSW Information Service and associated cyber security controls is called (select multiple correct answers)

Information Asset Owner

Information Service Owner

System Owner

IT service owner

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?