
Cyber Policy quiz 4
Quiz
•
Instructional Technology
•
Professional Development
•
Practice Problem
•
Easy
Nivedita Newar
Used 4+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Lee is late for a meeting due to a personal issue. She requests her colleague to login on her behalf to record a meeting since her attendance is really critical. What do you think of this scenario?
Lee has made the correct choice as her absence will create negative impact
If its only one occasion, it's fine to do so
Lee has breached Cyber policy by sharing her authentication detail
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
High risk UNSW Information Services must be configured to fail: (Select multiple correct answers)
into a secure state (fail secure)
as per Solution Architect's discretion
systems can never fail
at or before the recovery point objective
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Privileged accounts (including any privileged accounts used by suppliers or service providers, any service accounts, shared accounts or generic accounts) must have their business requirements documented and stored in a searchable format. The information stored must include: (Select multiple correct answers)
operational requirement.
ownership of the account (Individual and organisation).
contact details for the owner
duration of access and any other restrictions such as hours or days of access.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Gary is designing a high risk HR system and intends to use an account with username 'unswHR' as login. Is he permitted to do the same?
Yes
No
Can't say
5.
DROPDOWN QUESTION
30 sec • 1 pt
Unauthenticated access must only be provided for (a) digital information
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Rachel is the Business Owner of procurement software for the University of New South Wales (UNSW). She is responsible for ensuring that appropriate recovery strategies and processes are defined and implemented for UNSW Information Services to restore services in the required time. What must she do to ensure that the Disaster Recovery plan is effective?
The plan must be communicated effectively to all stakeholders, with training provided.
The plan must be tested every two years.
The plan must be reviewed and updated every five years.
The plan must be kept secret from all stakeholders.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How often must Rachel's system Disaster Recovery plan be tested?
Every two years. .
Every five years.
Annually and upon significant change
Whenever the IT department sees fit
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
CPA Flowchart Mastery
Quiz
•
7th Grade - Professio...
20 questions
instructional technology
Quiz
•
KG - Professional Dev...
15 questions
E learning
Quiz
•
Professional Development
15 questions
NYULMC | General Knowledge Check
Quiz
•
Professional Development
20 questions
QC Process
Quiz
•
Professional Development
15 questions
The Madeline Hunter Model of Mastery Learning
Quiz
•
Professional Development
20 questions
FUN 101 Week 3 Test Bolts, Studs & Nuts
Quiz
•
Professional Development
18 questions
ALP Summit 2021
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
