1.
Which action below would breach the Clear Desk and Screen Policy?
Correct Answer
B. Leaving a departmental laptop on your desk when you are not using it or at the end of the day
Explanation
Leaving a departmental laptop on your desk when you are not using it or at the end of the day would breach the Clear Desk and Screen Policy. This policy requires employees to ensure that all sensitive information is securely stored and not left unattended. Leaving a laptop on the desk increases the risk of unauthorized access or theft of confidential data. Locking the computer when away from the desk and locking confidential information in a cabinet are both actions that align with the policy, as they help protect sensitive information from being accessed by unauthorized individuals.
2.
A business unit's shared drive should allow all staff within that business unit to be able to access all records
Correct Answer
B. False
Explanation
Consider whether access to particular records/folders should be restricted
3.
Because I work in a secure building, I can discuss confidential information in an open work area.
Correct Answer
B. False
Explanation
Tip - if you need to discuss confidential information, consider doing so in a secure meeting room.
4.
The Information Security Policy and related policies only apply to electronic and hardcopy records and do not apply to verbal discussions
Correct Answer
B. False
Explanation
The statement is false because Information Security Policy and related policies apply to both electronic and hardcopy records as well as verbal discussions. Verbal discussions can also involve sensitive information that needs to be protected, and therefore, should be subject to the same security measures and policies as other forms of records.
5.
You overhear a conversation where a co-worker reveals that he had looked up the name of a high school friend on a departmental database and proceeds to disclose some of his high school friend's personal information. What should you do?
Correct Answer
B. Inform your supervisor/manager of the incident.
Explanation
The Inappropriate Access to Personal Information Policy requires employees to report suspected instances where there may have been unauthorised access to personal information so that the Privacy Officer and other relevant staff can decide whether to notify an affected individual.
6.
After finishing a meeting with a client at an external location, you make your way back to the office. You get on a tram that is half full of other commuters. Your mobile rings, and it is another one of your clients wants to discuss their case with you. What should you do?
Correct Answer
C. Inform the client that you will call them back once you return to the office
Explanation
In this situation, the best course of action would be to inform the client that you will call them back once you return to the office. This is because discussing the case quietly with the client or answering their query while on the tram may compromise the confidentiality of the conversation. It is important to ensure that sensitive information is not overheard by others in a public setting. Therefore, it is best to wait until you are in a private and secure location before discussing the case further with the client.
7.
Which of the following is a type of information security?
Correct Answer
D. All of the above
Explanation
All of the options listed (network security, cloud security, and application security) are types of information security. Network security focuses on protecting networks and their infrastructure from unauthorized access or attacks. Cloud security involves protecting data and applications that are stored in the cloud from breaches or data loss. Application security aims to secure software applications and prevent vulnerabilities that can be exploited by hackers. Therefore, all three options are valid types of information security measures.
8.
Which of the following is not a threat to information security?
Correct Answer
A. Disaster
Explanation
While disasters, such as fires, floods, or earthquakes, can impact the availability and integrity of information, they are typically not considered intentional threats like eavesdropping, unchanged default passwords, or information leakage. Disasters are more often associated with business continuity and disaster recovery planning rather than direct information security threats.
9.
Which information security technology is used to avoid browser-based hacking?
Correct Answer
A. Anti-malware in browsers
Explanation
Anti-malware tools in browsers are designed to detect and prevent malicious activities, including browser-based hacking attempts. These tools help protect users from various online threats such as malware, phishing, and other types of attacks that may target web browsers.
10.
Compromising confidential information comes under _________
Correct Answer
C. Attack
Explanation
Compromising confidential information is considered an attack. In the context of information security, an attack refers to any unauthorized action that seeks to exploit vulnerabilities in a system, network, or application. In this case, compromising confidential information involves an intentional and unauthorized attempt to access, disclose, or misuse sensitive data, which is considered an attack on the information's confidentiality. Security measures are implemented to prevent, detect, and respond to such attacks to safeguard the integrity, availability, and confidentiality of information.