You are on page 1of 3

COMPUTER SECURITY

1. Your colleague - report to isg


2. Passwords - InFy4Evr$
3. Client audit - politely decline
4. Infosys policies - no
5. You need - you will inform your manager
6. You accidently - you promptly
7. You come across - no, since
8. Ms azure - use aip ‘confidential’
9. Call from unknown - vishing
10. Right to monitor - yes
11. Information security - all the above
12. Match : worm - self replicating
Virus - needs user to launch

SECURE USAGE OF INTERNET AND EMAIL

1. Piece of code - no, client code


2. Online personal - personal maildid nd unique password
3. Under which circumstances - not under
4. Infosys finance - notify information security
5. While browsing - Exit from site notify CCD
6. Critical development - you seek hlp of ur manager
7. Medium - Raising AHD
8. Weekend - confidential

INFOSYS POLICIES AND PROCEDURES

1. Match : Source Code - highly confidential


User Passwords - highly confidential
2. Information security - option c nd d
3. Appropriate sequence - Classification Labeling Handling Disposal
4. Project closed - check with ur manager
5. You find - shred
6. Responsible - every individual

SECURITY WITHIN PREMISES AND OUTSIDE

1. Security risk - they may carry


2. Other infoys office - no I cannot
3. Travelling - Explain
4. ODC - get an
5. Hosting Conference - a nd c
6. Not security - b nd d
BUSINESS CONTINUITY MANAGEMENT

1. Pandemic - Follow guidelines


2. Emergency disaster - you will politely
3. Suspicious - be vigilant
4. Ready for office - you call reception
5. Mobile number - telephone directory
6. Head - coo

INTELLECTUAL PROPERTY RIGHTS

1. Automation tool - yes provided


2. Incorporate open - yes provided
3. Who owns ip - employer
4. Commercial offering - a nd b
5. Found a bug - no decompilation
6. Delivery manager - approach ip team

PRIVACY AND DATA PROTECTION

1. Acceptable data - retaining employee


2. Protect personal info - both a nd b
3. Intranet side - none of above
4. Each infoscion - all the above
5. Performance assessment - it is someone else
6. Regarding privacy - Privacy is about providing
7. PII - PII collected
8. Non infoscion - since the contact no
9. Blood group - blood group sensitive should not disclosed
10. Personal Info - name
11. Server path - do not access

ANTI BRIBERY AND ANTI CORRUPTION MODULE 1

1. All options correct


2. My wife - yes as long as
3. All options correct
4. My client stockholm - dinner expense
5. My client - Mementos are covered
6. My customer - I will upload cv
7. Come to my notice - I will immediately raise
8. All statements correct
PEOPLE SECURITY AND ASHI AWARNESS

1. IC - ic is set up
2. GRB - false
3. Mr. B - no this wont be construed
4. True
5. Ms. X nd Mr. Y - company has zero tolerance
6. Sexual harassment - by writing to GRB
7. True
8. True
9. All the above
10. All the above

CONFLICT OF INTEREST AND CODE CERTIFICATION

1. All the above


2. All the above
3. No the nature
4. No your relationship
5. Yes if option 1 & 2

CONFLICT OF INTEREST DISCLOSURE

OUTSIDE - NO
INTELLECTUAL - NO
FINANCIAL - NO
DECLARATION - NO NO
DO YOU WISH - NO

You might also like