Professional Documents
Culture Documents
ISMS Assessment PDF
ISMS Assessment PDF
Question 1
Correct
Select one:
a. You must change your password whenever there is any indication of possible system
or password compromise.
b. You must use passwords in an automated log-on process whenever possible to keep
the password from being intercepted while entering the password.
c. Your password must have an eight-character minimum length.
d. You must keep passwords confidential and avoid keeping a paper record of
passwords,
unless this can be stored securely.
The correct answer is: You must use passwords in an automated log-on process whenever
possible to keep the password from being intercepted while entering the password.
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 1/14
18/01/2019 Assessment
Question 2
Correct
Clear screen means that computers are to remain locked when you move away from your desk.
Clear Desk means that confidential documents are to be under lock & key and should not be
accessible to unauthorized parties when you move from your desk. These statements are
Select one:
True
False
Question 3
Correct
Select one:
a. Delete an unexpected or unsolicited message
c. Do not Register CSS email account in any external mailing list for receipt
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 2/14
18/01/2019 Assessment
Question 4
Correct
Select one:
a. Assist with the protection and proper use of information assets
Question 5
Correct
Trojan horses are software programs that hide their true purpose, and reveal their designed
behaviour only when activated.
Select one:
True
False
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 3/14
18/01/2019 Assessment
Question 6
Correct
Select one:
a. Do not share my password
e. A and C
Question 7
Correct
What method(s) can be used to protect sensitive data from prying eyes?
Select one:
a. Passwords
b. File Permissions
c. Encryption
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 4/14
18/01/2019 Assessment
Question 8
Correct
Which of the following is a good practice when handling user accounts and passwords?
Select one:
a. Sharing your password with the IT department when they need it to fix a problem
b.
Using the "Remember Password" feature
The correct answer is: Using a different password for Company and non-Company accounts
Question 9
Correct
Select one:
a. Assist with the protection and proper use of information assets
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 5/14
18/01/2019 Assessment
Question 10
Correct
Which of the following message attachments would you be wise not to open? A message with
an attachment that:
Select one:
a. Appears more than once in your Inbox
b. Says it's a sample copy of a new game from a recognized company e-mail address
Question 11
Correct
Select one:
True
False
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 6/14
18/01/2019 Assessment
Question 12
Correct
If you're not careful about your Internet browsing, which of the following can be the result?
Select one:
a. Spyware
b. Viruses
c. Hacking
Question 13
Correct
What is a Trojan?
Select one:
a. A descendant of the legendary city of Troy
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 7/14
18/01/2019 Assessment
Question 14
Correct
Select one:
a. Email
b. Instant Message
c. Internet download
Question 15
Correct
What is PII?
Select one:
a. Personally Identifiable Information
b. Personality Identification of Individual
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 8/14
18/01/2019 Assessment
Question 16
Correct
What are the Three Components of Title II which is most often associated with HIPAA
Compliance
Select one:
a. Privacy, Integrity, Security
Question 17
Correct
Select one:
True
False
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 9/14
18/01/2019 Assessment
Question 18
Correct
The overall process regarding risk assessment is identification, analysis and evaluation. What is
mandatory?
Select one:
a. A document called Risk Assessment Report
The correct answer is: Risk assessment sheets or information collected through risk
assessment tool
Question 19
Correct
An old college buddy would like to send you pics of his trip to Cancun, what should you do?
Select one:
a. Give him your personal e-mail account
b. Tell him your not interested
d. Have him upload it to your company's FTP site for retrieval at a later date
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 10/14
18/01/2019 Assessment
Question 20
Correct
If you're not careful about your Internet browsing, which of the following can result?
Select one:
a. Spyware or Adware installation
b. Browser Hijacking
Question 21
Correct
Select one:
a. Accident
b. Intent
c. Ignorance
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 11/14
18/01/2019 Assessment
Question 22
Correct
Select one:
a. A type of bank account that allows businesses to process credit card payments
Question 23
Correct
Select one:
True
False
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 12/14
18/01/2019 Assessment
Question 24
Correct
Select one:
a. Any freely given, specific, informed and unambiguous indication of the data subject's
wishes by which he or she, by a statement or by a clear affirmative action, signifies
agreement to the processing of his/ her personal data
b. Organization that determines the purposes and means for processing personal data
c. Organization that processes personal data on behalf of and in accordance with the
instructions of the controller (for example CSS Corp processes personal information on
behalf of its clients.)
Question 25
Correct
If you are installing new software for your department, which of the following is not required?
Select one:
a. Following the password security requirements detailed in the Information Security
Policy
b. Notifying the IT dept. about any backup and recovery procedures that are required or
are provided by the vendor
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 13/14
18/01/2019 Assessment
https://gtp.csscorp.com/mod/quiz/review.php?attempt=20148 14/14