Sunteți pe pagina 1din 4

ISMS Quiz

Question Question Answer Choices (Tick any one)


No.
1. What is information security? a) Protection of business vision, mission and values
b) Protection of policy and procedures
c) Protection of confidentiality, integrity and availability
d) Protection of intellectual property

Answer: c
2. Before we share any secret, confidential or a) They are certified to ISO 27001:2013 standard
internal use information with contractors or b) They have registered with the Government Authorities as
with any external party, we must ensure that licensed suppliers
c) They have documented their ISMS Policy
d) They have signed a Non-Disclosure Agreement with our
organization

Answer: d
3. While moving away from your Desk / a) You should carry the documents and the computer
Computer keyboard with you
b) You should always inform your colleague to keep a watch
on your documents and computer
c) You should put a paper weight on the documents lying on
your desk
d) You should put the documents in the drawer and lock the
drawer as well as the screen of your computer

Answer: d

4. Corrective Action means a) Eliminating the nonconformity so that the problem is

pg. 1
ISMS Quiz
Question Question Answer Choices (Tick any one)
No.
solved temporarily
b) Identifying the person because of whom the nonconformity
has occurred and training him/her to increase the
awareness
c) Identifying cause of the nonconformity and eliminating it so
that the problem does not repeat in future
d) Treating the nonconformity with appropriate selection of
control from Annex A of ISO 27001 standard

Answer: c
5. While creating new documented information a) It is essential that the document carries company logo as
the watermark
b) A copy of the new information must be created so that in
case the information is destroyed by mistake, the same can
be recovered easily
c) It is mandatory to mark the information classification on
the document, e.g. confidential, secret, etc.
d) It is important to call the CISO to monitor the information
creation from the information security perspective

Answer: c

6. What are you expected to do when you see a a) Do nothing, just observe and be ready to explain it to your
suspicious activity that may cause breach of manager when asked
information security of your organization? b) Raise the fire alarm so that everyone can evaluate the

pg. 2
ISMS Quiz
Question Question Answer Choices (Tick any one)
No.
building immediately
c) Report the incident to CISO using either phone or email
d) Call the police using the mobile and report to them the
whole incident

Answer: c
7. What care must be taken while sending an a) Check if the computer has appropriate label on it or not
email? b) Consider putting your reading glasses so that you can see
clearly what you are typing
c) Double check the recipients and content of your email
before you send it
d) Ask the CISO if you should send the email to the expected
recipient or not

Answer: c
8. Before deleting any information from your a) Make multiple copies before deleting the information.
computer, you should b) Double check the information being deleted so that you do
not delete any important information by mistake
c) Ask your colleague if they would like to have a copy of the
information before you delete it
d) Pres CTL+ALT+DEL keys together

Answer: b

9. For all important information, you should make a) IT team is regularly taking the backup of that information
sure that b) Multiple users from different departments have access to
that information
c) A copy of that important information is kept at your home /
resident so that you can retrieve the information if it is

pg. 3
ISMS Quiz
Question Question Answer Choices (Tick any one)
No.
accidently deleted
d) All that information is kept on the Desktop for easy
accessibility

Answer: a
10. All the passwords that you are using for a) Should be shared with your colleagues and manager so that
accessing various systems and applications in case if you forget they can help your recover it
b) Should be typed on a Notepad file and kept on the Desktop
of your Computer / Laptop for easy accessibility
c) Should be remembered and not shared with anyone in any
condition
d) Should be printed and kept on the Desk so that you can
easily refer to it while accessing the systems / applications

Answer: c

Date: 17th December 2019

pg. 4

S-ar putea să vă placă și