1.
Social Media Policy applies to:
Correct Answer
A. All PTC individuals
Explanation
The Social Media Policy applies to all PTC individuals, which includes employees, contractors, and any other individuals associated with PTC. This policy is not limited to specific departments or teams, but rather encompasses all individuals within the organization. It is designed to provide guidelines and regulations for the use of social media platforms, ensuring that PTC's reputation and confidential information are protected.
2.
Don't alter previous posts without indicating that you have done so.
Correct Answer
A. Correct your mistakes
Explanation
The correct answer is "Correct your mistakes" because it is the most appropriate response to the given statements. The other options do not address the issue of making mistakes and correcting them.
3.
According to PTC password Policy, the PTC password expires in _____ days.
Correct Answer
C. 90
Explanation
According to the PTC password policy, the PTC password expires in 90 days.
4.
Is it ok to create a link from your blog, website, or another social networking site to a PTC website without identifying yourself as an associate of PTC.
Correct Answer
B. No
Explanation
Creating a link from your blog, website, or another social networking site to a PTC website without identifying yourself as an associate of PTC is not okay. This is because it can be misleading to the users who click on the link, as they may not be aware that you are associated with the PTC website. It is important to be transparent and disclose any affiliations or associations to ensure ethical and honest practices in online interactions.
5.
PTC Password must be at least ________ characters in Length.
Correct Answer
C. 8
Explanation
The correct answer is 8 because the question is asking for the minimum number of characters required for a PTC password. Therefore, the password must be at least 8 characters in length.
6.
Service Account password expires after every ______ days.
Correct Answer
C. 180
Explanation
Service Account password expires after every 180 days. This means that the password for the service account needs to be changed every 180 days to maintain security and prevent unauthorized access. Regularly changing passwords helps to mitigate the risk of password compromise and ensures that only authorized individuals have access to the service account.
7.
How many digits Password on mobile devices is required by PTC?
Correct Answer
C. 6
Explanation
PTC requires a 6-digit password on mobile devices.
8.
The MDMS will not inventory the following information:
Correct Answer
C. Installed Applications
Explanation
The MDMS, or Mobile Device Management System, is responsible for inventorying information about mobile devices. However, it will not inventory the information related to installed applications. This means that the MDMS will not keep track of the applications that are installed on the mobile devices.
9.
The Personal Data on PTC owned devices can be remotely wiped by PTC IT for Security Reasons?
Correct Answer
A. True
Explanation
PTC IT has the capability to remotely wipe the personal data on their owned devices for security reasons. This means that if there is a security breach or if a device is lost or stolen, PTC IT can erase all the personal data on the device to prevent unauthorized access to sensitive information. This measure helps to protect the privacy and security of individuals and ensures that their personal data does not fall into the wrong hands.
10.
What is full form of RFC?
Correct Answer
B. Request for change
Explanation
RFC stands for "Request for Change." It refers to a formal process used in project management and IT service management to request modifications or alterations to a system, process, or service. This acronym is commonly used in organizations to streamline the process of implementing changes and ensuring proper documentation and approval.
11.
Who is responsible for updating information security policy?
Correct Answer
A. Information Security committee
Explanation
The Information Security committee is responsible for updating the information security policy. This committee is specifically designated to oversee and manage the organization's information security practices. They are responsible for developing, implementing, and maintaining the policies and procedures that ensure the confidentiality, integrity, and availability of the organization's information assets. The committee consists of members from various departments and stakeholders who have the expertise and knowledge to make informed decisions regarding information security.
12.
Does information security policy apply to contractors?
Correct Answer
A. Yes
Explanation
Information security policy applies to contractors because they are often given access to sensitive information and resources within an organization. Contractors must adhere to the same security standards and protocols as employees to ensure the protection of data and systems. This helps maintain consistency in security practices and reduces the risk of unauthorized access or data breaches.
13.
Third party software policy include independent contractors engaged by PTC on PTC owned equipment?
Correct Answer
A. True
Explanation
The statement is stating that the third party software policy includes independent contractors who are engaged by PTC (the company) and are using PTC owned equipment. This means that the policy applies to these contractors and they must follow the guidelines and regulations outlined in the policy. Therefore, the correct answer is true.
14.
Third Party software Policy applies to : - a.All third party software acquired by PTC b.Its Subsidiaries c.Installed on PTC equipment d.Software acquired by the PTC Royalties group or open source software that is approved by the PTC open source committee ( [email protected] )
Correct Answer
A. A, b, c
Explanation
The Third Party software Policy applies to all third party software acquired by PTC, its subsidiaries, and software installed on PTC equipment. It also applies to software acquired by the PTC Royalties group or open source software that is approved by the PTC open source committee.
15.
Which of the these are appropriate in accordance with ‘’ Acceptable use of Third Party Software ‘’
a. Software Asset Management Process - Secure repository for storage of software licenses and that all software be procured through official and clearly-defined procedures.
b. Use of Personally Owned Software on PTC equipment
c. Software acquired through acquisition of another company
d. Use of PTC-Owned software on Personally-Owned devices
e. Duty to report violation
Correct Answer
B. A,c,d
Explanation
The appropriate options in accordance with "Acceptable use of Third Party Software" are a, c, and d. Option a states that there should be a secure repository for storage of software licenses and that all software should be procured through official and clearly-defined procedures. Option c states that software acquired through the acquisition of another company is appropriate. Option d states that the use of PTC-owned software on personally-owned devices is acceptable. Therefore, options a, c, and d are all in line with the acceptable use of third-party software.
16.
Which of the following are categories of requests/tickets in SD+?
Correct Answer
C. Service & Incidence
Explanation
The correct answer is "Service & Incidence." In SD+, requests/tickets are categorized into different categories to help organize and prioritize them. Service & Incidence category is likely used for incidents or issues that require immediate attention and resolution. This category may include requests related to service disruptions, system errors, or other incidents that impact the normal functioning of the service.
17.
Which of the following is not a section of a request view?
Correct Answer
D. Footer
Explanation
The footer is not a section of a request view. In a request view, the header typically contains important information such as the requestor's name, contact details, and the date of the request. The description section provides details about the request itself, including the purpose and any specific requirements. The communication section is used to document any communication or correspondence related to the request. However, there is no specific section called footer in a request view.
18.
Which of the following is not a service category template in SD+?
Correct Answer
D. General
Explanation
The given answer, "General," is not a service category template in SD+. This implies that there are specific service category templates available in SD+, such as Hardware, Software, and Undefined. However, General is not one of them.
19.
What is ISMS?
Correct Answer
D. Information Security Management System
Explanation
ISMS stands for Information Security Management System. It is a framework that helps organizations manage and protect their sensitive information. It involves the implementation of policies, procedures, and controls to ensure the confidentiality, integrity, and availability of information. ISMS includes risk assessment, incident management, employee awareness training, and continuous monitoring to identify and address security vulnerabilities. By implementing an ISMS, organizations can effectively manage information security risks and protect their valuable data from unauthorized access, disclosure, alteration, or destruction.
20.
What are the 3 different services that CS includes to optimize solution performance and ensure maximum value with minimum risk or burden?
Correct Answer
D. InService
Explanation
InService is the correct answer because it refers to the services provided by CS (Customer Service) to optimize solution performance and ensure maximum value with minimum risk or burden. It implies that CS offers various services to support customers throughout the lifecycle of their products or solutions, addressing any issues or concerns they may have and ensuring that they get the most out of their investment. The other options (SLM, PLM, and IoT) do not specifically relate to the services provided by CS in optimizing solution performance and minimizing risk or burden.
21.
What are the main Information security objectives for CS?
Correct Answer
B. Protection of customer data
Explanation
The main information security objective for CS is the protection of customer data. This is crucial in order to maintain the privacy and confidentiality of sensitive information. By implementing measures such as encryption, access controls, and secure storage, organizations can ensure that customer data is not compromised or accessed by unauthorized individuals. Protecting customer data is essential in building trust and maintaining the reputation of the organization.
22.
Teams that are responsible for handling and resolving information security incidents are:
Correct Answer
C. Security Manager & CS Team
Explanation
The correct answer is Security Manager & CS Team. This is because handling and resolving information security incidents require a collaborative effort between the security manager and the CS (Computer Security) team. The security manager is responsible for overseeing the overall security strategy and policies, while the CS team is responsible for implementing and managing the technical aspects of security, including incident response. By working together, they can effectively identify, analyze, and mitigate security incidents to protect the organization's information assets.
23.
______________ executes vulnerability scan; record scan tests; follow Change Management process to apply necessary changes in systems.
Correct Answer
C. CS team members
Explanation
CS team members are responsible for executing vulnerability scans, conducting record scan tests, and following the Change Management process to apply necessary changes in systems. This role falls within the responsibilities of the CS team members, as they are typically tasked with ensuring the security and integrity of the systems they manage. The Security Manager and CS Manager may have oversight and provide guidance to the CS team members, but the actual execution of these tasks is carried out by the team members themselves.
24.
To which of the following a PTC employee can share his/her account or password details:
Correct Answer
D. No one
Explanation
Sharing account or password details with anyone, including business partners, other PTC personnel, or family members, is not allowed. It is against company policy and poses a security risk. Therefore, a PTC employee should not share their account or password details with anyone.
25.
It is recommended to secure PTC laptops with a password-protected screensaver with automatic activation feature set to:
Correct Answer
C. 10 mins or less
Explanation
It is recommended to secure PTC laptops with a password-protected screensaver with an automatic activation feature set to 10 minutes or less. This ensures that the laptop screen locks after a short period of inactivity, preventing unauthorized access to sensitive information. A shorter activation time reduces the risk of someone accessing the laptop when the user is away, enhancing security measures.
26.
Which of the following action is not prohibited at PTC?
Correct Answer
D. Using only PTC Licensed Software
Explanation
The correct answer is "Using only PTC Licensed Software". This action is not prohibited at PTC, meaning that employees are allowed to use PTC Licensed Software. The other options listed in the question are actions that are prohibited at PTC, such as sharing proprietary information without authorization, recording calls without informing participants, and using unauthorized personal devices or storage systems for PTC information.
27.
Which is True Information Classification Levels?
Correct Answer
D. All
Explanation
The statement "All" is the correct answer because it includes all the given information classification levels, which are Confidential, Internal, and Public. This means that all types of information, regardless of their sensitivity or intended audience, fall under these classification levels.
28.
All information that is not labelled shall be considered __________ and __________ labelling is mandatory.
Correct Answer
D. Internal, Confidential
Explanation
The question is asking for the two types of information that are not labelled. The correct answer is "Internal, Confidential" because it implies that information that is internal to the organization and confidential in nature is not labelled. This means that within the organization, there is information that is meant to be kept private and is not shared with the public.
29.
Whenever possible use mobile phones instead of fixed phones, mobile phones are safer. which classification is it?
Correct Answer
B. Confidential
Explanation
The given statement suggests that using mobile phones instead of fixed phones is safer. This information is likely to be classified as confidential because it pertains to the safety of using certain types of phones. Confidential information is typically restricted to a select group of individuals and is not meant to be shared with the general public.