57% found this document useful (7 votes)
34K views15 pages

The Information Like TCS

This document contains a series of statements related to handling information security at TCS. It addresses topics like protecting sensitive information, maintaining confidentiality of client data, appropriate use of TCS resources, social engineering threats, information classification and handling policies. The document seems to be testing the reader's knowledge of TCS information security protocols and best practices for securing data.

Uploaded by

ABHISHEK TIDKE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
57% found this document useful (7 votes)
34K views15 pages

The Information Like TCS

This document contains a series of statements related to handling information security at TCS. It addresses topics like protecting sensitive information, maintaining confidentiality of client data, appropriate use of TCS resources, social engineering threats, information classification and handling policies. The document seems to be testing the reader's knowledge of TCS information security protocols and best practices for securing data.

Uploaded by

ABHISHEK TIDKE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

The information like TCS

Which is the most important


who is responsible for

while working on a project


To whom should you express your concerns

rohit is a project leader for a team


you must

tom has joined a project


your client manager requests
while working on an assignment
if you are working on a sensitive
you are changing
information such as
when you are going on a long
an associate has stored
you receive an e-mail on your TCS ID
you are on leave:3,4

you are searching the internet:1,4

you are taking a print out :1,2,4

as a tcs associate:4

rakesh has been :3

what data would you typically:4

while working on office network:1,2,3

you are working in a shift:3,4

how would you protect:1,2,4

you are working on a projectat a client :4

when you share the information with :1

you are going on vacation.:3

which of the following statements is/are:2,4

you receive a call from your friend:4

what must you do before leaving:1

you are under pressure:2,4

you are attending an important:2

if a document is labeled TCS:2,3

if you find a person whom:1,3

you are executing a project :2

which of the following choices should be covered:1234

you college friend shares will code:2

you are expected to deliver a presentation:1,2

an associate carried a usb pen drive:1,2

you just received an e-mail:1

tcs recommended methods used:2

writing down passwords is wrong:4

you have prepared a design document:1

you have prepared a design document:2

when you have to retain the information:1234

information classified as restricted:1


the client has sent you some data:1234

you are responsible for talking the backup:124

why do you need business continuity:13

you cannot set auto-forward e-mail:1

where can you find TCS process:1

you are begin stopped at security desk before:3

you find that your webmail ID is:12

you have backed up your:3

where classification is not specified by:2

that makes your password weak:234

you are owner of the information:3

is connected to tcs network through cable:1

what is referred to as social:3

what are the different information classified:3

which of the forllowing is most appropriate with:3

your colleague calls you from the TCS:4

you are going to do a project audit:3

what are using the same password for an application:1

due care must be taken:1

who is responsible for having account/relationship:2

how should an information security:1

you are resposible for taking the backup:124

you are working overseas at a client:4

if you have to provide access to your:134

the printer got jammed while you were taking:2

you are working on an application:4

you have a business need to use:2

which of the following is not true about:12

you informed by client that sensitive information id begin:34

You might also like