0% found this document useful (0 votes)
11K views17 pages

ISecurity

TCS recommends methods for protecting confidential information, such as backing up project information regularly and using strong, unique passwords. Access controls are important for protecting confidential information, and concerns about information security should be reported to the appropriate authorities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11K views17 pages

ISecurity

TCS recommends methods for protecting confidential information, such as backing up project information regularly and using strong, unique passwords. Access controls are important for protecting confidential information, and concerns about information security should be reported to the appropriate authorities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

How would you protect TCS

Tom has joined a project

You receive an e-mail on your TCS ID


You just received an e-mail from your bank

What data would you typically select for the back up

TCS recommended methods used


Your colleague calls you from the TCS entry gate

You oserve that one of your TCS

Where can you find TCS process for Business continuty

Your client manager requests you to send a


Your canot set auto-forward e-mail message to

Rohit is a project leader for a team of 30

What is referred to as social


To whom should you express your concerns

You receive a call from your friend asking you to leave immediately as there is some

Which is the most important protection for information


The access related controls for confidential

What are the different information classification cat

You want to start a blog to discuss


You are using the same password for an application for a long time

You were creating some design

You are changing your projects


To communicate with your colleagues in TCS

You are going to vacation. Your

You have been working from home on your laptop


The TCS recommended method

You have backed up your project information

What makes your password weak


You are informed by the client that sensitive information

If you have to provide access to your information


You observed that one of your TCS colleagues keeps

Due care must be taken for virus

You are being stopped at security desk before


You have been working from home on your laptop

You are on leave when you receive an urgent call

Which of the following statements is/are


The information like TCS press releases

You are working on a sensitive project being

You are searching the internet for some information.


You need t mail the estimation sheet created as a

What data should you typically select


You have prepared a design document for the new product

Who is responsible for having


You have moved from offshore to client location

There is afire in your offshore development Center


You are working on a project and require logging on to

TCS recommended methods

You might also like