Information Security for 2020 Integrity Day

While opening While opening the email, you got an interesting but suspicious message from a company. The message said that “you’ve won the lottery” and the company was asking you specific personal and banking details so that they could lodge a large sum of money in your bank account. These emails are a common type of cyber-attack that goes by the name of….?
Phishing
Spyware
Spoofing
One day when looking at your e-mail inbox, you find you have received an email from a friend you have not heard from for at least one year. When you open the email the text says ‘Hi, please click here http://shorturl.jhdsuyc.com, there is surprise for you’. What would you do in such scenario?
You do nothing with the e-mail – and, certainly, you don’t click on the link
You click on the link, since you know the sender (friend) of the e-mail
You click on the link only if it looks somehow familiar to you
Nokia’s Information Security Policy aims to
Protect and safeguard Nokia’s sensitive information and business processes
Enable and enhance the security features of our solutions provided to the customers
All of the above
None of the above
In particular, the information security policy applies to the following
All proprietary information that belongs to Nokia
All client and customer information and associated data in the custody of Nokia
All supplier, contractor, collaborator and other third party information
All physical assets, such as servers, storages, network equipment, security equipment, backup, devices, CD’s and backup tapes and communication links, computer equipment, communications equipment, media and any other equipment relating to facilities, maintenance
All of the above
None of the above
All of the above and there are more
In alignment to the Nokia information security policy, Nokia business groups and corporate functions may implement their own standard operating procedures, process, guidelines and instructions; provided they are stronger than this policy and approved by the Head of Information Security
True
False
Who manage the security incidents? Employees can report security incidents at security@nokia.comh king had six wives?
Global Delivery Center
Global IT Center
Global Security Operation Center
Frank works in the Research and Development department and has access to sensitive information. Which of the following practices will help to ensure the security of this information? Select that NOT apply
Avoid sharing sensitive information with others unless they meet access criteria and have a legitimate business need to knows
Delete/shred the information he no longer needs to do his job. Polk
Openly discuss sensitive information as long as it's on company premises
Share restricted files in encrypted format and share the encryption key using another form of communication
David, a data analyst, receives a new laptop to work from home. The IT department told him that it was preconfigured with the appropriate security settings. Does David need to do anything else to secure the data on his laptop? Select all that apply
He should change the factory default settings and password of his home network
He should set strong passwords for all his home network devices such as printers and scanners
He should shield his screen from unauthorized eyes
He should not download unauthorized software or open suspicious email attachments
All of the above
Jim is about to leave the office to meet a client. However, he has to upload a large file before he leaves. Unfortunately, the Internet speed is slow, and he's afraid he may be late if the speed doesn't improve. That's when he receives a call:
 
"Hi, it's Matthew from IT. Are you having any issues with your computer?" "I was about to call! My Internet speed seems really slow. Can you help me out?”,“Sure, give me your username and password, and I can fix it remotely.” How should Jim proceed? Select the best option and click Submit
Do as directed — he's going to be late for the client meeting
Decline to share the information requested and contact IT directly
Ask for Matthew's employee ID, then share the information requested
Your colleague Sheila is at the fax machine. As you approach her, she seems startled and drops some of the papers she's faxing. While helping her collect them, you notice that she's faxing what looks like the sales figures for the current quarter. It's odd because documents like that are never faxed — they're always emailed. What should you do? Select the best option and click Submit
Apologize for startling her and accidentally seeing the documents
Alert the Human Resources department or Legal & Compliance department because her behavior is odd and the content might be confidential
Do nothing and move on
Individually Identifiable Information includes things like Name, Date of Birth, Phone Number, E-Mail Address, Health Information, and Social Security Number.
True
False
Which of the following is a good way to create a password?
Your children's or pet's name
Using look-alike substitutions of numbers or symbols
A combination of upper and lowercase letters mixed with numbers and symbols
Using common names or words from the dictionary
When receiving an email from unknown contact that has an attachment, you should:
Open the attachment to view its content
Delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home
If you're not careful about your Internet browsing, which of the following can result
Spyware or Adware installation
Browser Hijacking
Information or identity theft
All of the above
What should everyone know about information security?
Computer security is part of everyone's job
Verify everything!  Verify who the person is on the phone.  Verify that the website is real.  Verify that the visitor belongs where you find them
Report anything suspicious to your IT department.
Do not ignore unusual computer functioning.  It might be a sign of malware.
All of the above
Please enter a name to appear on your results:
{"name":"Information Security for 2020 Integrity Day", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"While opening While opening the email, you got an interesting but suspicious message from a company. The message said that “you’ve won the lottery” and the company was asking you specific personal and banking details so that they could lodge a large sum of money in your bank account. These emails are a common type of cyber-attack that goes by the name of….?, One day when looking at your e-mail inbox, you find you have received an email from a friend you have not heard from for at least one year. When you open the email the text says ‘Hi, please click here http:\/\/shorturl.jhdsuyc.com, there is surprise for you’. What would you do in such scenario?, Nokia’s Information Security Policy aims to","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker