Information Security Policy: Trivia Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Nrauthan
N
Nrauthan
Community Contributor
Quizzes Created: 1 | Total Attempts: 70
Questions: 29 | Attempts: 70

SettingsSettingsSettings
Information Security Policy: Trivia Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Social Media Policy applies to:

    • A.

      All PTC individuals

    • B.

      Technology infrastructure team

    • C.

      Communications systems

    • D.

      Computer software and databases

    Correct Answer
    A. All PTC individuals
    Explanation
    The Social Media Policy applies to all PTC individuals, which includes employees, contractors, and any other individuals associated with PTC. This policy is not limited to specific departments or teams, but rather encompasses all individuals within the organization. It is designed to provide guidelines and regulations for the use of social media platforms, ensuring that PTC's reputation and confidential information are protected.

    Rate this question:

  • 2. 

    Don't alter previous posts without indicating that you have done so. 

    • A.

      Correct your mistakes

    • B.

      Leave the error as this is not a face to face conversation

    • C.

      Avoid chiming

    • D.

      None of these

    Correct Answer
    A. Correct your mistakes
    Explanation
    The correct answer is "Correct your mistakes" because it is the most appropriate response to the given statements. The other options do not address the issue of making mistakes and correcting them.

    Rate this question:

  • 3. 

    According to PTC password Policy, the PTC password expires in _____ days.

    • A.

      30

    • B.

      60

    • C.

      90

    • D.

      180

    Correct Answer
    C. 90
    Explanation
    According to the PTC password policy, the PTC password expires in 90 days.

    Rate this question:

  • 4. 

    Is it ok to create a link from your blog, website, or another social networking site to a PTC website without identifying yourself as an associate of PTC.

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    Creating a link from your blog, website, or another social networking site to a PTC website without identifying yourself as an associate of PTC is not okay. This is because it can be misleading to the users who click on the link, as they may not be aware that you are associated with the PTC website. It is important to be transparent and disclose any affiliations or associations to ensure ethical and honest practices in online interactions.

    Rate this question:

  • 5. 

    PTC Password must be at least ________ characters in Length.

    • A.

      10

    • B.

      12

    • C.

      8

    • D.

      6

    Correct Answer
    C. 8
    Explanation
    The correct answer is 8 because the question is asking for the minimum number of characters required for a PTC password. Therefore, the password must be at least 8 characters in length.

    Rate this question:

  • 6. 

    Service Account password expires after every ______ days.

    • A.

      90

    • B.

      120

    • C.

      180

    • D.

      60

    Correct Answer
    C. 180
    Explanation
    Service Account password expires after every 180 days. This means that the password for the service account needs to be changed every 180 days to maintain security and prevent unauthorized access. Regularly changing passwords helps to mitigate the risk of password compromise and ensures that only authorized individuals have access to the service account.

    Rate this question:

  • 7. 

    How many digits Password on mobile devices is required by PTC? 

    • A.

      4

    • B.

      5

    • C.

      6

    • D.

      7

    Correct Answer
    C. 6
    Explanation
    PTC requires a 6-digit password on mobile devices.

    Rate this question:

  • 8. 

    The MDMS will not inventory the following information:

    • A.

      Identification

    • B.

      OS version

    • C.

      Installed Applications

    • D.

      Mobile Roaming Status

    Correct Answer
    C. Installed Applications
    Explanation
    The MDMS, or Mobile Device Management System, is responsible for inventorying information about mobile devices. However, it will not inventory the information related to installed applications. This means that the MDMS will not keep track of the applications that are installed on the mobile devices.

    Rate this question:

  • 9. 

    The Personal Data on PTC owned devices can be remotely wiped by PTC IT for Security Reasons? 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    PTC IT has the capability to remotely wipe the personal data on their owned devices for security reasons. This means that if there is a security breach or if a device is lost or stolen, PTC IT can erase all the personal data on the device to prevent unauthorized access to sensitive information. This measure helps to protect the privacy and security of individuals and ensures that their personal data does not fall into the wrong hands.

    Rate this question:

  • 10. 

    What is full form of RFC?

    • A.

      Review for Change

    • B.

      Request for change

    • C.

      Recently Filed Change

    • D.

      None of these

    Correct Answer
    B. Request for change
    Explanation
    RFC stands for "Request for Change." It refers to a formal process used in project management and IT service management to request modifications or alterations to a system, process, or service. This acronym is commonly used in organizations to streamline the process of implementing changes and ensuring proper documentation and approval.

    Rate this question:

  • 11. 

    Who is responsible for updating information security policy?

    • A.

      Information Security committee

    • B.

      Security manager

    • C.

      IT Team

    • D.

      None of these

    Correct Answer
    A. Information Security committee
    Explanation
    The Information Security committee is responsible for updating the information security policy. This committee is specifically designated to oversee and manage the organization's information security practices. They are responsible for developing, implementing, and maintaining the policies and procedures that ensure the confidentiality, integrity, and availability of the organization's information assets. The committee consists of members from various departments and stakeholders who have the expertise and knowledge to make informed decisions regarding information security.

    Rate this question:

  • 12. 

    Does information security policy apply to contractors?

    • A.

      Yes

    • B.

      No

    Correct Answer
    A. Yes
    Explanation
    Information security policy applies to contractors because they are often given access to sensitive information and resources within an organization. Contractors must adhere to the same security standards and protocols as employees to ensure the protection of data and systems. This helps maintain consistency in security practices and reduces the risk of unauthorized access or data breaches.

    Rate this question:

  • 13. 

    Third party software policy include independent contractors engaged by PTC on PTC owned equipment?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is stating that the third party software policy includes independent contractors who are engaged by PTC (the company) and are using PTC owned equipment. This means that the policy applies to these contractors and they must follow the guidelines and regulations outlined in the policy. Therefore, the correct answer is true.

    Rate this question:

  • 14. 

    Third Party software Policy applies to : -          a.All third party software acquired by PTC          b.Its Subsidiaries          c.Installed on PTC equipment          d.Software acquired by the PTC Royalties group or open source software that is approved  by the PTC open source committee ( [email protected] )     

    • A.

      A, b, c

    • B.

      D

    • C.

      A,b,c,d

    • D.

      A,b,c, excluding d

    Correct Answer
    A. A, b, c
    Explanation
    The Third Party software Policy applies to all third party software acquired by PTC, its subsidiaries, and software installed on PTC equipment. It also applies to software acquired by the PTC Royalties group or open source software that is approved by the PTC open source committee.

    Rate this question:

  • 15. 

    Which of the these are appropriate in accordance with ‘’ Acceptable use of Third Party Software ‘’        a.  Software Asset Management Process - Secure repository for storage of software licenses and that all software be procured through official and clearly-defined procedures.        b.  Use of Personally Owned Software on PTC equipment        c. Software acquired through acquisition of another company        d.  Use of PTC-Owned software on Personally-Owned devices        e. Duty to report violation

    • A.

      A,b,c,d,e

    • B.

      A,c,d

    • C.

      A,b,c,d

    • D.

      A,d,b

    Correct Answer
    B. A,c,d
    Explanation
    The appropriate options in accordance with "Acceptable use of Third Party Software" are a, c, and d. Option a states that there should be a secure repository for storage of software licenses and that all software should be procured through official and clearly-defined procedures. Option c states that software acquired through the acquisition of another company is appropriate. Option d states that the use of PTC-owned software on personally-owned devices is acceptable. Therefore, options a, c, and d are all in line with the acceptable use of third-party software.

    Rate this question:

  • 16. 

    Which of the following are categories of requests/tickets in SD+? 

    • A.

      Service & Maintenance

    • B.

      Maintenance & Decommission

    • C.

      Service & Incidence

    • D.

      Decommission

    Correct Answer
    C. Service & Incidence
    Explanation
    The correct answer is "Service & Incidence." In SD+, requests/tickets are categorized into different categories to help organize and prioritize them. Service & Incidence category is likely used for incidents or issues that require immediate attention and resolution. This category may include requests related to service disruptions, system errors, or other incidents that impact the normal functioning of the service.

    Rate this question:

  • 17. 

    Which of the following is not a section of a request view?

    • A.

      Header

    • B.

      Description

    • C.

      Communication

    • D.

      Footer

    Correct Answer
    D. Footer
    Explanation
    The footer is not a section of a request view. In a request view, the header typically contains important information such as the requestor's name, contact details, and the date of the request. The description section provides details about the request itself, including the purpose and any specific requirements. The communication section is used to document any communication or correspondence related to the request. However, there is no specific section called footer in a request view.

    Rate this question:

  • 18. 

    Which of the following is not a service category template in SD+?

    • A.

      Hardware

    • B.

      Software

    • C.

      Undefined

    • D.

      General

    Correct Answer
    D. General
    Explanation
    The given answer, "General," is not a service category template in SD+. This implies that there are specific service category templates available in SD+, such as Hardware, Software, and Undefined. However, General is not one of them.

    Rate this question:

  • 19. 

    What is ISMS?

    • A.

      International Security Management System

    • B.

      International Software Management System

    • C.

      Indian Software Management System

    • D.

      Information Security Management System

    Correct Answer
    D. Information Security Management System
    Explanation
    ISMS stands for Information Security Management System. It is a framework that helps organizations manage and protect their sensitive information. It involves the implementation of policies, procedures, and controls to ensure the confidentiality, integrity, and availability of information. ISMS includes risk assessment, incident management, employee awareness training, and continuous monitoring to identify and address security vulnerabilities. By implementing an ISMS, organizations can effectively manage information security risks and protect their valuable data from unauthorized access, disclosure, alteration, or destruction.

    Rate this question:

  • 20. 

    What are the 3 different services that CS includes to optimize solution performance and ensure maximum value with minimum risk or burden?

    • A.

      SLM

    • B.

      PLM

    • C.

      IOT

    • D.

      InService

    Correct Answer
    D. InService
    Explanation
    InService is the correct answer because it refers to the services provided by CS (Customer Service) to optimize solution performance and ensure maximum value with minimum risk or burden. It implies that CS offers various services to support customers throughout the lifecycle of their products or solutions, addressing any issues or concerns they may have and ensuring that they get the most out of their investment. The other options (SLM, PLM, and IoT) do not specifically relate to the services provided by CS in optimizing solution performance and minimizing risk or burden.

    Rate this question:

  • 21. 

    What are the main Information security objectives for CS?

    • A.

      Controlling user accesses

    • B.

      Protection of customer data

    • C.

      Service availability

    • D.

      Customizing solution

    Correct Answer
    B. Protection of customer data
    Explanation
    The main information security objective for CS is the protection of customer data. This is crucial in order to maintain the privacy and confidentiality of sensitive information. By implementing measures such as encryption, access controls, and secure storage, organizations can ensure that customer data is not compromised or accessed by unauthorized individuals. Protecting customer data is essential in building trust and maintaining the reputation of the organization.

    Rate this question:

  • 22. 

    Teams that are responsible for handling and resolving information security incidents are:

    • A.

      Security Manager

    • B.

      CS Team

    • C.

      Security Manager & CS Team

    • D.

      None of the above

    Correct Answer
    C. Security Manager & CS Team
    Explanation
    The correct answer is Security Manager & CS Team. This is because handling and resolving information security incidents require a collaborative effort between the security manager and the CS (Computer Security) team. The security manager is responsible for overseeing the overall security strategy and policies, while the CS team is responsible for implementing and managing the technical aspects of security, including incident response. By working together, they can effectively identify, analyze, and mitigate security incidents to protect the organization's information assets.

    Rate this question:

  • 23. 

    ______________ executes vulnerability scan; record scan tests; follow Change Management process to apply necessary changes in systems.

    • A.

      Security Manager

    • B.

      CS Manager

    • C.

      CS team members

    • D.

      None of the above

    Correct Answer
    C. CS team members
    Explanation
    CS team members are responsible for executing vulnerability scans, conducting record scan tests, and following the Change Management process to apply necessary changes in systems. This role falls within the responsibilities of the CS team members, as they are typically tasked with ensuring the security and integrity of the systems they manage. The Security Manager and CS Manager may have oversight and provide guidance to the CS team members, but the actual execution of these tasks is carried out by the team members themselves.

    Rate this question:

  • 24. 

    To which of the following a PTC employee can share his/her account or password details:

    • A.

      Business Partners

    • B.

      Other PTC personnel

    • C.

      Family

    • D.

      No one

    Correct Answer
    D. No one
    Explanation
    Sharing account or password details with anyone, including business partners, other PTC personnel, or family members, is not allowed. It is against company policy and poses a security risk. Therefore, a PTC employee should not share their account or password details with anyone.

    Rate this question:

  • 25. 

    It is recommended to secure PTC laptops with a password-protected screensaver with automatic activation feature set to:

    • A.

      30 mins

    • B.

      20 mins

    • C.

      10 mins or less

    • D.

      None of these

    Correct Answer
    C. 10 mins or less
    Explanation
    It is recommended to secure PTC laptops with a password-protected screensaver with an automatic activation feature set to 10 minutes or less. This ensures that the laptop screen locks after a short period of inactivity, preventing unauthorized access to sensitive information. A shorter activation time reduces the risk of someone accessing the laptop when the user is away, enhancing security measures.

    Rate this question:

  • 26. 

    Which of the following action is not prohibited at PTC?

    • A.

      Sharing proprietary information outside of PTC without proper authorizations.

    • B.

      Recording telephone/conference calls or video conferences without informing the other participants that the call/session is being recorded at the outset of the call/session

    • C.

      The use of personal devices (e.g., laptops, tablets, etc.) and/or storage systems or services not authorized/supported by PTC for saving, sharing or archiving PTC proprietary information

    • D.

      Using only PTC Licensed Software

    Correct Answer
    D. Using only PTC Licensed Software
    Explanation
    The correct answer is "Using only PTC Licensed Software". This action is not prohibited at PTC, meaning that employees are allowed to use PTC Licensed Software. The other options listed in the question are actions that are prohibited at PTC, such as sharing proprietary information without authorization, recording calls without informing participants, and using unauthorized personal devices or storage systems for PTC information.

    Rate this question:

  • 27. 

    Which is True Information Classification Levels?

    • A.

      Confidential

    • B.

      Internal

    • C.

      Public

    • D.

      All

    Correct Answer
    D. All
    Explanation
    The statement "All" is the correct answer because it includes all the given information classification levels, which are Confidential, Internal, and Public. This means that all types of information, regardless of their sensitivity or intended audience, fall under these classification levels.

    Rate this question:

  • 28. 

    All information that is not labelled shall be considered __________ and __________ labelling is mandatory.

    • A.

      Confidential , Public

    • B.

      Internal, Public

    • C.

      Confidential , Internal

    • D.

      Internal, Confidential

    Correct Answer
    D. Internal, Confidential
    Explanation
    The question is asking for the two types of information that are not labelled. The correct answer is "Internal, Confidential" because it implies that information that is internal to the organization and confidential in nature is not labelled. This means that within the organization, there is information that is meant to be kept private and is not shared with the public.

    Rate this question:

  • 29. 

    Whenever possible use mobile phones instead of fixed phones, mobile phones are safer. which classification is it?

    • A.

      Internal

    • B.

      Confidential

    • C.

      Public

    • D.

      Private

    Correct Answer
    B. Confidential
    Explanation
    The given statement suggests that using mobile phones instead of fixed phones is safer. This information is likely to be classified as confidential because it pertains to the safety of using certain types of phones. Confidential information is typically restricted to a select group of individuals and is not meant to be shared with the general public.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 02, 2016
    Quiz Created by
    Nrauthan
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.