Cyber Policy quiz 4

Cyber Policy quiz 4

Professional Development

20 Qs

quiz-placeholder

Similar activities

BMW Recap

BMW Recap

Professional Development

15 Qs

MD 100 Review

MD 100 Review

Professional Development

20 Qs

Cloud migration prerequisite

Cloud migration prerequisite

University - Professional Development

15 Qs

Google Professional Architect 4 - 61 to 80

Google Professional Architect 4 - 61 to 80

Professional Development

20 Qs

Containerization and Backup Quiz

Containerization and Backup Quiz

Professional Development

20 Qs

Cyber Policy Quiz 1

Cyber Policy Quiz 1

Professional Development

23 Qs

Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Professional Development

25 Qs

Cyber Policy quiz 3

Cyber Policy quiz 3

Professional Development

25 Qs

Cyber Policy quiz 4

Cyber Policy quiz 4

Assessment

Quiz

Instructional Technology

Professional Development

Easy

Created by

Nivedita Newar

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Lee is late for a meeting due to a personal issue. She requests her colleague to login on her behalf to record a meeting since her attendance is really critical. What do you think of this scenario?

Lee has made the correct choice as her absence will create negative impact

If its only one occasion, it's fine to do so

Lee has breached Cyber policy by sharing her authentication detail

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

High risk UNSW Information Services must be configured to fail: (Select multiple correct answers)

into a secure state (fail secure)

as per Solution Architect's discretion

systems can never fail

at or before the recovery point objective

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Privileged accounts (including any privileged accounts used by suppliers or service providers, any service accounts, shared accounts or generic accounts) must have their business requirements documented and stored in a searchable format. The information stored must include: (Select multiple correct answers)

operational requirement.

ownership of the account (Individual and organisation).

contact details for the owner

duration of access and any other restrictions such as hours or days of access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gary is designing a high risk HR system and intends to use an account with username 'unswHR' as login. Is he permitted to do the same?

Yes

No

Can't say

5.

DROPDOWN QUESTION

30 sec • 1 pt

Unauthenticated access must only be provided for ​ (a)   digital information

publicly accessible
private
sensitive
highly sensitive

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Rachel is the Business Owner of procurement software for the University of New South Wales (UNSW). She is responsible for ensuring that appropriate recovery strategies and processes are defined and implemented for UNSW Information Services to restore services in the required time. What must she do to ensure that the Disaster Recovery plan is effective?

The plan must be communicated effectively to all stakeholders, with training provided.

The plan must be tested every two years.

The plan must be reviewed and updated every five years.

The plan must be kept secret from all stakeholders.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How often must Rachel's system Disaster Recovery plan be tested?

Every two years. .

Every five years.

Annually and upon significant change

Whenever the IT department sees fit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?