Security Usage of Internet and Email
Security Usage of Internet and Email
Computer Security
Secure Usage of Intermet and Eman
1. Under which circumstances you are permitted to
download and use a trial version of a software for
InfosysPoliciesand Procedures developing Client code
Security within Premises and Oa. The deadline of the projectis nearing and there Correct Answer
outside would be an impact on business if the software is not You should not downlo0ad
downloaded and installed and use the trial version of
Business Continuity Management Ob. If there is a written approval from the Client and anysoftware even if it is
reporting manager at Infosys suggested by your manager
Intellectual PropertyRights and even if you have
Oc. If the trial version has been used for past deliverables reached the deadline. You
but on a different computer
Privacy and Data Protection can politely decline doing
Od. Not under any circumstances. Options such as, the same andreferthem to
Anti bribery and anti-corruption the Information Security
alternative licensed software's or requestfor the policy which states that
module purchase of the required software must be explored
only authorized and
PEOPLE SECURITY AND ASHI Oe. Options a &c licensed software shall be
AWARENESS installed and used in our
work environment. You can
try an alternative software
Privacyand Data Protection for
Delivery inSoftware house or
Software Security
Validation Portal (SSVP).
Conflict of Interest and Code
You will be held
Certification responsible for the usage
even if it was suggested by
your manager since the
offence was committed by
you.
ex-Infoscion over a WebEx Correct Ansrer
Oa. You seek help from an
Oa. Since this is from the Finance department, you will Correct Answel
access the site by clicking on the link given in the email
Phishingemailsappearto
and update the requested details
besentfrom legitimate
Ob. 1gnore the email SOurces/businesses, but
are actually created and
Oc. Notify Information Security Group (ISG) on distributed by hackerswho
[email protected] by attaching the suspicious email for are afteryour personal
investigation official information. Also
no department/company
Od. Log an AHD (Advanced Help Desk) request with IS
willask you to shareyour
(Information Systems)team seeking furtherclarity on
the email
credentials directly.
Further, be vigilant about
mails tagged as [**External
Mail] as they always
originate from an external
sender, If you a receive
such an email, the correct
action would be to report
the same to ISG via
email/helpdesk number or
by forwarding the mail to
[email protected]. Quick
action on such suspicious
email would help avoid
other unsuspecting victims
from falling prey to
phishing emails.
5. Which of the following is the correct medium to report an
Information Security Incident?