This document contains a series of statements related to handling information security at TCS. It addresses topics like protecting sensitive information, maintaining confidentiality of client data, appropriate use of TCS resources, social engineering threats, information classification and handling policies. The document seems to be testing the reader's knowledge of TCS information security protocols and best practices for securing data.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
57%(7)57% found this document useful (7 votes)
34K views15 pages
The Information Like TCS
This document contains a series of statements related to handling information security at TCS. It addresses topics like protecting sensitive information, maintaining confidentiality of client data, appropriate use of TCS resources, social engineering threats, information classification and handling policies. The document seems to be testing the reader's knowledge of TCS information security protocols and best practices for securing data.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15
The information like TCS
Which is the most important
who is responsible for
while working on a project
To whom should you express your concerns
rohit is a project leader for a team
you must
tom has joined a project
your client manager requests while working on an assignment if you are working on a sensitive you are changing information such as when you are going on a long an associate has stored you receive an e-mail on your TCS ID you are on leave:3,4
you are searching the internet:1,4
you are taking a print out :1,2,4
as a tcs associate:4
rakesh has been :3
what data would you typically:4
while working on office network:1,2,3
you are working in a shift:3,4
how would you protect:1,2,4
you are working on a projectat a client :4
when you share the information with :1
you are going on vacation.:3
which of the following statements is/are:2,4
you receive a call from your friend:4
what must you do before leaving:1
you are under pressure:2,4
you are attending an important:2
if a document is labeled TCS:2,3
if you find a person whom:1,3
you are executing a project :2
which of the following choices should be covered:1234
you college friend shares will code:2
you are expected to deliver a presentation:1,2
an associate carried a usb pen drive:1,2
you just received an e-mail:1
tcs recommended methods used:2
writing down passwords is wrong:4
you have prepared a design document:1
you have prepared a design document:2
when you have to retain the information:1234
information classified as restricted:1
the client has sent you some data:1234
you are responsible for talking the backup:124
why do you need business continuity:13
you cannot set auto-forward e-mail:1
where can you find TCS process:1
you are begin stopped at security desk before:3
you find that your webmail ID is:12
you have backed up your:3
where classification is not specified by:2
that makes your password weak:234
you are owner of the information:3
is connected to tcs network through cable:1
what is referred to as social:3
what are the different information classified:3
which of the forllowing is most appropriate with:3
your colleague calls you from the TCS:4
you are going to do a project audit:3
what are using the same password for an application:1
due care must be taken:1
who is responsible for having account/relationship:2
how should an information security:1
you are resposible for taking the backup:124
you are working overseas at a client:4
if you have to provide access to your:134
the printer got jammed while you were taking:2
you are working on an application:4
you have a business need to use:2
which of the following is not true about:12
you informed by client that sensitive information id begin:34