ICEG IS Behavior Survey Challenge FY21 - Poland

Due to COVID-19, Accenture is now turning to Virtual Private Networks (VPNs) to provide secure connectivity for remote workers. Which of the below answers will ensure that Accenture’s VPN solution remains secure?
Users keep VPNs up to date by applying latest patches
Users access work-related websites only
Users do not connect personal devices (tablets, Smart TVs, etc.) to VPNs
All of these options
There is a scheduled fire drill in your building. What should you do?
Call in sick
Excuse yourself by pointing out that you have an urgent deliverable
Participate in the drill
None of these options
What actions can you take to protect sensitive data in your Accenture system when you go out for break?
Lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer"
Activate your favorite screensaver
Turn off the monitor
Leave your computer screen as is, since a password protected screensaver is installed and will activate after 5 minutes of inactivity
Which of the following statements is correct under the Clean Desk Policy?
Don't leave confidential documents on your desk
Don't leave valuable items on your desk if you are not in your work area
Don't leave laptops unattended without securing them with a cable lock
All of these options
Select below the ONLY place/places you are authorized to store the final version of Accenture/Client work documents for future reference
USB Key
Local archive on your PC
SharePoint or MS Teams
Printed paper copy
Select below the correct tool to use to restrict access to sensitive information
Public channel in Teams
An access-controlled SharePoint site
Personal OneDrive folder
Third party folder lock software
Select below the one tool that you must NOT use to restrict access to sensitive information
WinZip AES 256 Encryption
Personal OneDrive folder
Microsoft Office Suite (IRM)
An access-controlled SharePoint site
Which of the following unlicensed, non-Accenture or non-Client provided software are you permitted to use for Accenture or Client business purposes?
Public code repository (e.g. GitHub project)
Peer-To-Peer Software
Accenture Facebook protected page
None of these options
In what circumstances are you permitted to retain deliverables that Accenture has developed or co-developed for an Accenture Client?
When you think these materials would be helpful for you in the future
When it would avoid duplicating efforts in future and save time and money for Accenture
In no circumstances
When you believe that your MD/Lead would probably think it was the most professional behavior for you to adopt
In what circumstances are you required to remove (“scrub”) all client data and project references from Accenture project deliverables before you archive them?
When you roll off the project
When the Client specifically requests it
When you are terminating your employment with Accenture
In all of these circumstances
In what circumstances can you use your Accenture Enterprise password for other purposes?
To access personal email account from an Accenture device
To help a teammate in an emergency when he/she is temporarily locked out from Accenture IT systems
To access my online banking
None of these options
If you experience a security incident involving Accenture information, your first action must be:
Immediately contact local DP&IS
Notify your local CIO Team
Call the Accenture Security Operations Center (ASOC)
Immediately send an email to your Supervisor/CAL
If you experience a security incident involving Client information, your first action must be:
Immediately contact your HR Representative
Call the Accenture Security Operations Center (ASOC)
Immediately send an email to your Supervisor/CAL
Notify the Client IT Team
Where should you store your project-related work?
Personal storage devices that you own (e.g. USB drives, CDs, or DVDs)
Third-party storage (e.g., Google Drive, Dropbox, iCloud)
Accenture- or Client-provided computer
Accenture- or Client-provided online solutions (e.g. SharePoint or OneDrive)
How frequently do you confirm that Accenture has the right to retain and reuse work products?
Never
Monthly
When needed
Twice a year
On how many social media/third party websites or services should you use your Accenture credentials (combination of your Accenture email address and password)?
None
Only on the 1 or 2 that I use most frequently
Only between 3 and 5
Never more than 10
If you were to terminate your work contract of employment with Accenture, how should you keep your work products for your own future use?
I should create a backup on Google Drive
I should store them on an Accenture SharePoint
I should create a backup on personal hard drives/USB
None of these options
Which sentence, related to the use of services with project work products is TRUE?
I can use non-Accenture or non-Client provided office suites (e.g., Google Docs)
I can use a Public Code Repository (e.g., uploading Accenture or Client code to a publicly accessible GitHub project)
None of these options
I can use Accenture-provided pen drives, Mozy backup, or Encrypted backup tapes
When you do not pick up your printouts immediately after printing and leave them on the network printer near a corridor, what are the consequences for the information printed out?
The integrity of the information is no longer guaranteed
The availability of the information is no longer guaranteed
The confidentiality of the information is no longer guaranteed
None of these options
€Information Security” is a responsibility of:
All Accenture employees and collaborators
The IT Security Department
Security Guards
Top Management
Tailgating is a form of social engineering that allows hackers to:
Watch the company’s main entrances 24/7
Obtain unauthorized access to our buildings or restricted office areas
Watch employees as they exit an Office/work site
Follow an employee after he/she has left work
Your Accenture laptop has been stolen. What is the best way to prevent further unauthorized access to your Accenture laptop?
Call the Accenture Security Operations Center (ASOC)
Immediately send an email to your Supervisor/CAL
Change the login password of your account from any other Accenture system
Login to your OneDrive account from another Accenture system and delete all the data
You have just moved to a new Accenture location and have been issued with a new set of passwords. Which one of these methods offers you the safest option for storing them?
Write them down in a notebook
Write them on a sticky note and apply it under your keyboard instead of near your computer
Store them in an Excel file on your computer but give the file a name that is totally unrelated to passwords
Use a password management tool supplied/authorized by Accenture
You have accidentally opened a web link contained in a suspicious email and now your computer is behaving strangely. What action should you take immediately?
No action is needed
Update and run the anti-virus software
Contact IT Help Desk
Restart your computer
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send it?
Scan the document with Accenture approved anti-virus software before sending
Send the document directly from your Accenture email account without encryption
Send the encrypted document and the password to the third-party via 2 separate emails
Send the unprotected/unencrypted document using a file sharing application
A Client has sent you via the physical postal service a USB key which contains project-related information. What is the safest thing to do?
Perform a virus scan of the USB key before opening any files it contains
Use the USB port at the front of your computer instead of the back because this
Do not use the USB key. Request the Client to send the file via email or upload it to a secure OneDrive or SharePoint
Trust the Client and use the files in the USB key
When working from home, how often should you use your non-Accenture computer to work on Accenture/Client material?
Almost every day
At least once a week
At least once a month
Never
How often should you log in your Accenture ID via public computers, such as from a library, cybercafé etc.?
Only when it’s necessary
At least once a week
About once a month
Never
How should you behave when receiving an email attachment?
I have to make sure it is from a person I know, and I am expecting the email
If I know the person or company that sent me the attachment, I open it
Trust Accenture’s security systems and open it right away
I scan the attachment using the Anti-Virus then I open it
Someone from Accenture posts something unusual on the company social media website. Do you have an obligation to act and, if so, what should you do?
Yes, and I should comment on the post
Yes, and I should share the post with the person to whom I report
No, and I can ignore the post
Yes, and I should contact the individual and confirm that he/she posted it
Why is it important to have a good understanding of Information Security policies and procedures?
It helps protect individuals from being the victims of security incidents
It provides an understanding of actions to take in the event of a security incident
It helps to understand the different levels of responsibility
All of these options
The first step in Security Awareness is being able to _____________ a security threat.
Avoid
Recognize
Challenge
Log
What should everyone know about information security?
Computer security is part of everyone's job
Report anything suspicious to your System Administrator
Computer functioning might be a sign of malware
All of these options
What should you do if you think your password has been compromised?
Change your password immediately
Report the incident to ASOC
Check other systems where you have accounts, as they may be compromised as well
Notify the person to whom you report
{"name":"ICEG IS Behavior Survey Challenge FY21 - Poland", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Due to COVID-19, Accenture is now turning to Virtual Private Networks (VPNs) to provide secure connectivity for remote workers. Which of the below answers will ensure that Accenture’s VPN solution remains secure?, There is a scheduled fire drill in your building. What should you do?, What actions can you take to protect sensitive data in your Accenture system when you go out for break?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

More Quizzes

210
Ur mom
1166
Женский тест: выберите кольцо и узнайте, когда вы выйдете замуж
100
Minority Mental Health Month Questionnaire
520
Do you know more about the summer solstice than JRT?
740
Context in context
520
Test
210
Guess the song by the emojis
1050
THE MAZING ABUSE DETECTOR
840
Are you addicted to your phone - quiz
11623
Periodicoprincipal
100
  [UV]TERMÔMETRO DE GESTÃO Meça a temperatura do seu negócio! O termômetro de gestão é uma ferramenta simples, rápida e gratuita. Ao responder o questionário abaixo, composto de poucas perguntas, é possível medir a“temperatura” da gestão de sua clínica ou consultório. Desenvolvido pela Interact Gestão de Negócios, os resultados fornecidos pelo termômetro podem ajudar a visualizar o gerenciamento do negócio. A Interact Gestão de Negócios não se responsabiliza quanto à veracidade das repostas apresentadas pelos participantes da pesquisa do "Termômetro de Gestão". O resultado da presente pesquisa não ​deve ser interpretado como​ qualquer recomendação técnica administrativa, e não deve ser considerado como critério para decisões ou planejamento estratégico que a clínica ou consultório decida seguir. É meramente um indicativo genérico referente à gestão do negócio, de acordo com parâmetros estabelecidos pela Interact Gestão de Negócios e não deve ser utilizado como base, orientação e tampouco opinião técnica para direcionamento de soluções de problemas que porventura existam nessas organizações. Ao responder esta pesquisa o participante concorda que os dados poderão ser utilizados de maneira sigilosa pela Interact Gestão de Negócios em suas análises, porém poderão compor resultados consolidados sem identificação individual.
1160
Powered by: Quiz Maker