Integrated Service Management System Quiz

A professional office environment with staff engaging in discussions about service management, security protocols, and technology, conveying a sense of teamwork and responsibility.

Integrated Service Management System Quiz

Test your knowledge of Integrated Service Management Systems with this comprehensive quiz. Designed for employees of NuAxis, this quiz covers essential topics such as document classification, incident management, and information security.

  • 31 engaging questions
  • Multiple choice and checkbox formats
  • Assess your understanding of vital security practices
31 Questions8 MinutesCreated by EmphasizingEagle342
Where can you find the published Standard Operating Procedures?
M Drive
MyNuAxis
Dropbox
Where are the measurement objectives found?
Section 1
Section 2
Section 3
Section 4
Section 5
Who is the Management Representative?
Jessica Price
Rhonda Holder
Tracy Newman
Lindsey Tepp
Who is the IT Security Manager?
Khurshid Anwar
Sharjeel Aziz
Faiz Khan
Raza Usman
What are the three things a document must have?
Document name, number, classification
Document name, date, classification
Document name, number, date
What are the four document classification types?
Confidential, Proprietary, Internal use, Public
Classified, Proprietary, Internal use, Public
Confidential, Proprietary, Restricted, Public
True/False - I must lock my computer when it's not in use.
True
False
True/False - It's okay to leave confidential and proprietary information on your desk.
True
False
True/False - It's okay to have sensitive information on your computer screen where others can see it.
True
False
True/False - All office doors and drawers containing confidential and proprietary information must be locked when unattended.
True
False
Select which of the following are considered confidential documents.
PII data
Proposals
Government regulations
Contracts
Procedures
Zendesk tickets
Request for Quotes
Financial files
Select which of the following are considered proprietary documents.
PII data
Proposals
Government regulations
Procedures
Contracts
Zendesk tickets
Templates
Project plans
Select which of the following are considered internal use documents.
Internal records
PII data
Project plans
Work instructions
Contracts
Proposals
Financial files
Zendesk tickets
True/False - Removable media, such as USB drives, must be provided by IT.
True
False
True/False - Removable media must be encrypted if it contains sensitive information.
True
False
Mobile Devices (personal or corporate) with NuAxis data must obey the following rules. Check all that apply.
Password protected
Must be jailbroken
Must have software/firmware that allows unintended functionality
Must operate with most current OS
What is risk?
Anything that poses a potential threat or issue to NuAxis
Likelihood (occurrence) + Consequence (impact) = RISK
All of the above
Who is responsible for identifying risks?
Managers
PIC
Everyone
Consultants
True/False - An information security risk is the possibility that a given threat will exploit vulnerabilities of an asset or group of assets and thus cause harm to the organization.
True
False
Select all examples of potential information security risks.
Lost data
Sensitive data transmitted to unintended recipient
Data intercepted through non secure channels
Overheard conversations
All of the above
What is a service request?
Any item associated with our information technology infrastructure that would not be addressed in a normal service request activity
A user request for services that provide standard or normal IT help desk activities
A type of incident that needs to be escalated
An incident that violates an explicit or implied security policy
What is an incident?
An incident that violates an explicit or implied security policy
A user request for services that provide standard or normal IT help desk activities
A type of incident that needs to be escalated
Any item associated with our information technology infrastructure that would not be addressed in a normal service request activity
What is a problem?
A type of incident that needs to be escalated
Any item associated with our information technology infrastructure that would not be addressed in a normal service request activity
A user request for services that provide standard or normal IT help desk activities
An incident that violates an explicit or implied security policy
What is a security incident?
A user request for services that provide standard or normal IT help desk activities
An incident that violates an explicit or implied security policy
Any item associated with our information technology infrastructure that would not be addressed in a normal service request activity
A type of incident that needs to be escalated
True/False - to report a service request, incident, problem, or security incident you enter a ticket.
True
False
True/False - there are four types of change requests.
True
False
True/False - only PIC members can identify the need for corrective action.
True
False
Where are assets tracked?
Inventory List
Asset List
Asset/Inventory List
They're not tracked
True/False - all employees must maintain the confidentiality of PII and company proprietary data to which they may have access to.
True
False
True/False - NuAxis does software development.
True
False
What's your name?
{"name":"Integrated Service Management System Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of Integrated Service Management Systems with this comprehensive quiz. Designed for employees of NuAxis, this quiz covers essential topics such as document classification, incident management, and information security.31 engaging questionsMultiple choice and checkbox formatsAssess your understanding of vital security practices","img":"https:/images/course4.png"}
Powered by: Quiz Maker