Information Security Awaremess Ans
Information Security Awaremess Ans
I will
What type of attack can happen when an attacker leaves an USB stick lying for an employee to plug in?
You receive an email from [email protected] asking you to send your full name, login username, password, and dat
DLP helps to:
You login to your system using your password, read about strategic information related to a merger, and financial for
What type of phishing attack happens through SMS?
Most devastating loss to the bank is:
Clear desk & clear screen policy enables users to:
Allowing ______ entry into restricted area is in violation of policy
Which of the following should be done for Data Leakage Prevention?
Which of the following is a type of malware? Click correct options.
You receive a suspicious email requesting urgent action. What should you do?
Which of the following is true about phishing attacks?
Your security settings are not allowing you to download an important e-mail attachment sent by your customer. What
What are the important components of Triad of information security?
A former colleague approaches you at work and requests access to your device for a few minutes to fill a form that is
___________ is a special form of attack using which hackers exploit – human psychology.
Jennifer receives an email claiming that her bank account information has been lost and that she needs to click a link
What does malware stand for?
Your colleague has sent confidential information to unauthorized recipients. What does this indicate?
Which of the following is true with regards to IT assets as per the policy?
ISSP stands for Information Security _____ and Procedures
Which of the following is NOT a social engineering attack?
In phishing, attackers target using ________ to do social engineering
Your friend is visiting you at work and wants to check his e-mail urgently. How do you respond?
What type of attack happens when an attacker simply walks in behind a person who has legitimate access?
You see an unknown individual without a badge trying to enter restricted area. What should you do?
Information security is ______ responsibility. Select the most appropriate option.
Which of the following is a part of clear desk & clear screen policy?
What is the main purpose of DLP in the bank?
If a user wants to share critical information outside of the organization for business purpose, how should he send the i
Which of these activities on social media are not allowed?
What should you do if your official mobile computing device is stolen?
What should you do if you suspect you have received a phishing email?
Which of the following is incorrect?
Most devastating loss to the bank is:
Which of the following are genuine ICICI bank domains?
Which action from list below can help restrict a malware attack?
You want to leave your workstation. What should you do before you leave?
Which Digital Rights Management solution do we use at ICICI?
Which among the following statements is correct
An unknown person is spotted following closely behind an employee and entering the restricted section of the buildin
Select all correct options. Human Firewalls are:
Which of the following are characteristics of Internal Data?
You are sitting in a café with your friend after work when your boss calls up, asking you to share some confidential d
Data Classification is:
Access control systems provide ________ environment.
You receive the following communication on email: Please clear payment of this critical and sensitive invoice. I will
Individuals who need and use ICICI data as part of their assigned duties or in fulfilment of assigned roles or functions
Which of the following are the characteristics of a strong password?
An electrician comes to your desk and asks you to step aside for a minute as he needs to check whether all the sockets
What are the characteristics of Confidential data?
All users are required to read the _____
Which of the following causes breach of DLP guidelines?
What are the characteristics of secret data?
In what way can a malware use your device to perform breach of security? Select the correct options.
What type of attack is Tailgating?
Which of the following is a strong password?
What should employees do upon resignation?
You should always be extra alert when you receive messages related to:
Which of the following are part of visitor management guidelines?
Which of the following is PII?
Your official IT assets battery life has reduced drastically over the last few days. What should you do?
You receive a phone call from an unknown person asking for PII of a customer. What kind of attack could this be?
What is the purpose of access security policy?
An employee does the following activities using the internet at work. Which of these activities are allowed?
Select the unauthorized data transmission from the below statements:
Which of these is a preventive measure against a ransomware attack?
Information Security is the process of
You see the message " Your computer is infected with a virus. Please click on the below link to remove it". What sho
Raj is an employee of the bank and he is loyal and honest towards his work. One day he comes to know that one of hi
Which of the following is true with regards to Shrink-wrapped/Freeware/Shareware Software?
A confidential file needs to be forwarded to the finance department. Who all should be kept in loop?
What is public data?
Breach of Bank's Information security policy could result into
Which of the following are examples of secret information?
All of the above
USB attack
Forward the email to [email protected]
Protect bank's sensitive and confidential data from being shared outside bank’s internal network
Secret
Smishing
Loss of data
Protect confidential information
Unauthorized
1,2,3
2,3
1,2,
All of the above
Inform IT helpdesk about the issue and ask them to help with the same
1,2,3
Explain that this would be against the security policy and politely decline
Social Engineering
Phishing
Malicious Software
Breach of policy
All of the above
Standarts
Denial of Service attac
Email
Explain to your friend that you cannot give him access to company network as it is against the security policy
Tailgating
Report the suspicious activity
Everyone's
All of the above
End users do not send critical information outside the corporate network
Protect the file by Seclore and then send it
Post employee information such as ID card, access number, etc
File an FIR with the police and submit a copy of the report to the concerned department
Forward the email to [email protected]
The internet has made it hard to collect PII
Loss of data
1,2
2,3
Lock cabinets containing documents with sensitive information
Seclore
1,3,4
Tailgating attack
1,2
1,2,3
Ensure that you are in a private place and that you are not connected to a public network before sending the informati
Act of classification of information based on sensitivity
All of the above
Report the suspicious email to [email protected]
Data Users
It is at least 8 characters long and It is significantly different from previous password
Lock the device, files and cabinets, step aside but keep a watch on what he is doing
1,2
Both i and ii
1,2
1,2
All of the above
Social Engineering
2,3
Surrender all their official devices to their manager or local IT personnel (as per the policy) to receive the required cle
All of the above
All of the above
All of the above
Contact the helpdesk and ask for assistance
Vishing attack
Both i. and ii.
Only job-related activities such as research and educational tasks
1,3,4
All of the above
Protecting Information
Contact the Helpdesk/ISG Team
2,3,4
All of the above
People who fall under the 'need to know' principle
Information explicitly approved by management for release to public
Both i and i
Strategic information like mergers and acquisitions, materially significant investment decision
t the security policy
before sending the information