1.
What are the essential elements of Information Security? Select all that apply.
Correct Answer(s)
A. Confidentiality
C. Availability
D. Integrity
Explanation
Confidentiality, Availability, and Integrity are the essential elements of Information Security. These elements are essential for security and rely on each other to succeed. Policies are just one part of implementing Information Security. They are not an essential element.
2.
What policies does the Employee Handbook cover?
Correct Answer
C. Company policies including pHone/e-mail guidelines and branding/copyright
Explanation
The Employee Handbook covers a variety of policies including phone/e-mail guidelines and branding/copyright. This means that the handbook provides guidelines and rules for employees regarding the use of company phones and emails, as well as guidelines for maintaining the company's branding and copyright. It ensures that employees understand the proper use of communication channels and the importance of protecting the company's intellectual property.
3.
Information Security is the policies, procedures, and practices required to maintain and provide assurance of the confidentiality, integrity, and availability of information.
Correct Answer
A. True
Explanation
The statement is true because information security refers to the measures and actions taken to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing policies, procedures, and practices to ensure the confidentiality, integrity, and availability of information. By maintaining these aspects, organizations can safeguard sensitive data, prevent unauthorized access or modifications, and ensure that information is accessible when needed.
4.
Which of the following documents are classified 'confidential'? Select all that apply.
Correct Answer(s)
B. Organizational Charts
C. Sales Contracts
Explanation
Organizational Charts & Sales Contracts are categorized confidential since they contain restricted information. Circulation of these documents must be kept to a minimum.
5.
Select the example that illustrates a strong password.
Correct Answer
C. Tp4tci2s4U2g!
Explanation
Tp4tci2s4U2g! is a strong password because it includes numbers, case, and symbols. The password for (4) this computer is too (2) strong for you to (4U2) guess!
6.
Which of the following items should be shredded prior to discarding? Select all that apply.
Correct Answer(s)
A. Ultimate Software CDs/DVDs
B. Training Materials
C. Network Diagrams
D. Organizational Charts
Explanation
Ultimate Software CDs/DVDs, training materials, network diagrams, and organizational charts must all be shredded prior to discarding.
7.
Ultimate Software's Privacy Policy _______________.
Correct Answer
B. Outlines Ultimate Software’s and your responsibilities when working with any personal information
Explanation
The correct answer is "outlines Ultimate Software’s and your responsibilities when working with any personal information". This is because the statement directly explains what the Privacy Policy does, which is to outline the responsibilities of both Ultimate Software and the user when handling personal information. It does not mention any specific policies such as Acceptable Use of Company Assets, VPN, or Acceptable Encryption, nor does it mention anything about system accessibility.
8.
Confidentiality is one component of Information Security. Confidentiality __________.
Correct Answer
B. Provides assurance that information is accessed by and shared only by those who are authorized
Explanation
Confidentiality ensures that information is accessed and shared only by authorized individuals, providing assurance that sensitive data remains protected from unauthorized access or disclosure. It involves implementing measures such as access controls, encryption, and secure communication channels to prevent unauthorized parties from gaining access to confidential information. By enforcing confidentiality, organizations can maintain the privacy and integrity of their data, ensuring that it is only accessible to those with the necessary authorization.
9.
Integrity, a component of Information Security, provides assurance that the systems responsible for delivering, storing, and processing information are accessible when they are needed.
Correct Answer
B. False
Explanation
Integrity provides assurance that the information accessed is trustworthy and reliable. Availability provides assurance that the systems responsible for delivering, storing, and processing information are accessible when they are needed.
10.
Which of the following are Information Security best practices you should follow? Select all that apply.
Correct Answer(s)
A. Never disable the antivirus application that comes with your laptop.
C. Scan e-mail attachments for viruses before opening them.
E. Do not store confidential information in a USB drive.
Explanation
The correct answers are A, C, and E. Your passwords should include letters, numbers, and symbols. Contact ITG Help Desk if you suspect you have a computer virus.