50% found this document useful (2 votes)
66K views83 pages

Saq Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
66K views83 pages

Saq Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

% rereeyreees Trives 23 rr

rose aan
nas =3 Sassidnsse thireiatetiras 3
Seti = 22 ++
FER i
= =z$ : :H
TET =
saw ee
=
> -

——tetee Te
Sessetes
=eae: —:
ad ae
vow —t
>
-- a
>
SHstetttitatetarinats .H H:
. - Tr reiteisess
d. Report it to SG via AHD Ada
helpdesk/email
ME. No, since this could lead to downloading of malware.
Stea youdcan check an alternative utility in the software
Mouse or raise a request in Software Security Validation
Portal (SSVP) portal for a manager approved exception. ¥
IR JA )
. Yes, as you plan to only use for the trial period
a HHH { | | | |
Pol 1
fd i
I \ I | J | !
| | i
¥: developer community
CH You seek help of your manager who in turn connects you
to a senior developer in the team to assist ¥'
Od, You seek help from a fellow Infascion who was previously
i
“ in the same project however now works fora different
Client
I
|
' NB | |
| | | | { i ‘
HNN THAT !
Hon © | i
ve id ob {1 uit nal,
RA EAN EN IN EL iL
L LL Nl KHANANGY 1 (it
ay
UMA| |
A LAL ni
LiL I o : Highly, Gontidentiaf) User OH
1 nal; 0a ed on Chan | Hid Ny Gohfides i

[ lease gl" fi i fi Ti MIKA AT AR

Sal I; il if Hh i) (HATA (NIT


hye 4. l al A

hel tli fly phn A} 304 rss Re 7

0
se IiA{ I i i / | (i | ! ih l ih A 1 ul
(I :
i NATAL
Wi it J ef Pass)
da f ee Mii INNS
11E3eS TR TL IIIA
Ll TTY HH, hy '

| f I Hi
| | NUL 0
|
PE I UREA TAR BE
SLL
\
Li 1th
AERni
ROE
PEAT |
LLL ututl) IHRE 11
ATTRRTA ANY
i EY |
"i
! A iim
il
il A
il |
Jj¥
Agi il
3, What Is the most appropriate action that you should tak
when you encounters a data breach?
t i will download the photographs, HL |
personal secure internet site and delete- ther
personal desktop.
Oc. I will mail the photographs
Pp to my y close
| frie
happen to know these employees, but whe de
their latest photographs. |

® d. None of the above ¥

no
|
|ili
I
hy should we protect personal i li
Meggues and partners? LH i

| Il Hl |
1yy
8| reazonsis
| Oper nd Li, i io?ll
avi Lida wh I
© indwvidual. | HURT i! i i lid 1

at A ii Privacy is iy
wl control or kno Winn fj
EI Likiir ir
i i
11 \ i 1 Py \

fi i |
7%i” jr jd
5 ly shared withn t
ny : 1 i i I hi Hi
b. Itis someone else's personal information and
~ shared in any form with others, who do not have a
need to know, Besides, this information is also confidentia
from Infosys’ perspective,
Oc. Since this is someone else's personal information
therefare | will take his / her consent and then I will
circulate it freely.

Od. The information may be shared by me, in the next


quarter.

ch of the following is NOT true with regard


to ha
JI (Personally Identifiable Information)?
mn
Lill fl

m ilo ili I uli |


, I ili
illi o
Ii n I, 4"
= beneficiary. i
@ d. All of these statements are col
~ JW pW Ap IA dip! A bp
Ble) a ph sind WN

aan A s

®s ~
Ne dl

FY ai
Ja. This is a great opportunity for Infosys, 50 i E
CV to HR to process for an offer of employm ent.

"Ob. 1 will pretend that | do not know that the new deal
|
the customer could be impacted by the client's son
a job with Infosys.
ask him to send the C3
Oc. 1 will send this to my friend and
| referred the client
me. That way no one will know that
son CV ' Infosys.
to s
eppify, where
WD d. 1 will upload the CV on Conne ctinfy/R
diligence and follow
compiets the additional due ;
arocesses for recruitment.
iulld beitaken
ili
if a vent
fli! L i il [IH | iil |
)ia| The cree tials

|
ff 3 ih ust be conducted :ar
le should be ve
i
il |
Hi
i ili
ll |
hane1d Du |

i i as a result he assessed and a

| O b, Al tailed writt en ca defining the scope of RETIREE


of stich vendors sh uldib
td
iti of
21

ill
Oe. A copy lilisuf pli
Ll wml or their acknowledgement and a :

i Yd. iit i Hin


© dorrect v LHL |
iil

first visit, | should


IH!
his
j 5. We propose to take
‘extensive meetings all day. What the
permissible limit of the meals expense ur
Bribery Policy? i

per person as th
(a, We can claim upto USD 250
ed in the A
from Europe, and the limits prescrib
pe (USD 250 )
Policy for meals incurred in Euro
will apply.
upto USD 150 per person,
as!
@® b. We can claim G
e Was incurred
{in India, and the
expens |
India will apply. v
will be reimburse
OY ¢, Any amount that is spent od
s expense after all
rat
Py
i He ni| |HI|id

;
i i
idhill

i
gin on my
kit. clic ARE i
pedis
i]i
Li iyo Ti
of the dod Ar iin fees ll
: = iil dhJd
ai fli,
I1 i i
il olIlHillli
ok :
py o i 0
eo il0 i il
S
0

E : i I il L
i
eli
ed5 1
pam
an
| Ii it
er profiles
is a insecure
way of protecting production

8. You are in production support team for a bank's financial


data warehouse system. One of the client's senior managers
‘asks you to check his bank account details as he is unable to
‘access his internet banking account. What will you do ?

Heis a client manager and | cannot havea better


unity to showcase that | understand the system very
Iwill pull out the required details from the syste i
hare it with him
out only last one transaction detail
I sett toad 10 5 SUA breach in the iver
€ o 0 run the batch job yourself since you ha
it
li ll 0 IHfi lil!
il ill il i IH I : il | i

a
ple
t = ue oun

] g | about th Ld
Il IY I 0 i 1 | il ¢ I) Ui

IE : Wd
If i
| il |

i i f I |
Jc. A gender neutral approach
= @q. All of the above v
Aq i li il}
| ue y oui
i : ii z oe ) ou
iliinI TTR
I

:
0 | (UATE
“A Group Project Manager (GPM
responsibilities over Mr. M. One
a date. After she asks him, she says,
know this, but | have a lot of influe
promotions around here. Mr. M de
his manager recommended him for
does not approve citing Mr. Mm’ ;
itor MrMisav
e about internationa I
ol

‘you will have it transferred to «


~ client so that only data is viewed bu
local machine, then you don’t havet

@® b. We have a duty to inform client abot


processing, and let them determine a
appropriate safeguards to be deploye

data masking, data may be gtored &


| Ii ill LL
i Vl rh |
bp 1 gv
i i
en
- gl
Lin |
\
heh |
Hd

: Il
:: on
© 5. Ihave written a book on Digital Web
ahead and publish it?

Oa. Yes, provided no proprietary/:


Infosys/ or its client is contained in the

Ob. Yes, provided proper approvals


are obta
publication portal prior to publication of r

Oe. No, this will directly compete with t ne


create opportunity to transfer organizat
business.

You might also like