Policy Quiz

A visually appealing illustration of a digital lock symbolizing information security, combined with elements of a quiz, such as question marks and checklists in a modern office setting.

Maytech Policy Quiz

Test your knowledge on Maytech's information security policies with our engaging quiz! This quiz covers various aspects of the company's protocols, including incident handling, confidentiality, and business continuity planning. Ideal for employees and stakeholders alike, it emphasizes the importance of safeguarding information assets.

Key Features:

  • 10 thought-provoking questions
  • Multiple choice and open-ended formats
  • Assess your understanding of crucial policies
10 Questions2 MinutesCreated by SecureMind102
What groups is Maytech single inventory of information assets subdivided into?
A) a software log and information asset log
B) a hardware inventory and a schedule of intangible assets
C) a) and b)
Choose the correct answer: Each reported weakness/incident or event is to be assessed for its likelihood and impact on the business in three main areas:
A) Confidentiality, Integrity and Availability
B) Privacy, Integrity and Availability
C) Confidentiality, Accuracy and Availability
Fill in the gap: A ticket has to be closed in full within ___ days for Incidents.
A) 10
B) 20
C) 30
Who is responsible for identifying business continuity risks, development, testing, and maintenance of business continuity plan?
A) CTO
B) ISM
C) CEO
Fill in the gap: The _________ addresses all the information continuity components of the Organisation’s activities and ensures that adequate trained resources are available to provide continuity of all the identified information security assets, including taking appropriate steps for the protection of staff (including information processing staff) and all information processing facilities.
A) Access Control Matrix
B) Asset, Risk, Control Register
C) Business Continuity Plan
Fill in the gap: The Contractor shall not, at any time during the course of the Work or thereafter, disclose any ____ or Technology to any other person.
A) Secrets
B) Restricted Information
C) Customers' Data
Choose the correct statement.
A) All access to client data is to be strictly prohibited unless prior approval is provided by the client.
B) All access to client data is allowed unless prohibited by the client.
C) All access to client data is to be strictly prohibited unless prior written approval is provided by the client.
Choose the correct answer: Paper-based documents labelled “private” should be:
A) recycled
B) cross-shredded
C) a) and b)
What email do you use to report about any suspicious emails, virus contamination, etc.?
Choose the correct answer: A non-conformance report is created when:
A) the process has met the audit requirements
B) the audit procedure has not been followed to
C) serious discrepancies have been identified
{"name":"Policy Quiz", "url":"https://www.supersurvey.com/QPREVIEW","txt":"Test your knowledge on Maytech's information security policies with our engaging quiz! This quiz covers various aspects of the company's protocols, including incident handling, confidentiality, and business continuity planning. Ideal for employees and stakeholders alike, it emphasizes the importance of safeguarding information assets.Key Features:10 thought-provoking questionsMultiple choice and open-ended formatsAssess your understanding of crucial policies","img":"https:/images/course8.png"}
Powered by: Quiz Maker