ICEG InfoSec Behavior Survey Challenge
Select below the ONLY place/places you are authorized to store the final version of Accenture/Client work documents for future reference.
USB Key
Local archive on your PC
SharePoint or MS Teams
Printed paper copy
Select below the correct tool to use to restrict access to sensitive information.
Public channel in Teams
An access-controlled SharePoint site
Personal OneDrive folder
Third party folder lock software
Select below the tool that you must NOT use to restrict access to sensitive information.
WinZip AES 256 Encryption
Personal OneDrive folder
Microsoft Office Suite (IRM)
An access-controlled SharePoint site
Which of these unlicensed, Non-Accenture or non-Client provided software are you permitted to use for Accenture or Client business purposes?
Public code repository (e.g. GitHub project)
Peer-To-Peer Software
Accenture Facebook protected page
None of these options
In what circumstances are you permitted to retain deliverables that Accenture has developed or co-developed for an Accenture Client?
When you think these materials would be helpful for you in the future
When it would avoid duplicating efforts in future and save time and money for Accenture
In no circumstances
When you believe that your MD/Boss would probably think it was the most professional behavior for you to adopt
In what circumstances are you required to remove all client data and project references from Accenture project deliverables (“scrub” them) before you archive them?
When you roll off the project
When the Client specifically requests it
When you are terminating your employment with Accenture
All of these options
In what circumstances can you use your Accenture Enterprise password for other purposes?
To access personal email account from an Accenture device
To help a teammate in an emergency when he/she is temporarily locked out from Accenture IT systems
To access my online banking
None of these options
If you experience a security incident involving Accenture information, your first action must be:
Immediately contact local DP&IS Team
Notify your local CIO Team
Call the Accenture Security Operations Center (ASOC)
Immediately send an email to your Supervisor/CAL
If you experience a security incident involving Client information, your first action must be:
Immediately contact your HR Representative
Call the Accenture Security Operations Center (ASOC)
Immediately send an email to your Supervisor/CAL
Notify the Client IT Team
Where have you stored your project-related work during the last 6 months?
Personal storage devices that you own (e.g. USB drives, CDs, or DVDs)
Third-party storage (e.g., Google Drive, Dropbox, iCloud)
Accenture- or Client-provided computer
Accenture- or Client-provided online solutions (e.g., SharePoint or OneDrive)
How frequently do you confirm that Accenture has the right to retain and reuse work products?
Never
Monthly
When Needed
Approximately twice each year
On how many social media/third party websites or services do you use your Accenture credentials (combination of your Accenture email address and password)?
None
On 1 or 2 only
Only between 3 and 5
More than 5
If you were to terminate your work with Accenture, how would you keep your work products for your own future use?
Create a backup on Google Drive
Store your work products on Accenture SharePoint
Create a backup on personal hard drives/USB
None of these options
Have you used any of the following services with current project work products during the last 6 months?
Yes, I have: Non-Accenture or non-Client provided office suite (e.g., Google Docs)
Yes, I have: Public code repository (e.g., uploading Accenture or client code to a publicly accessible GitHub project)
No, I have used none of the above
Yes, I have: Mozy backup, Encrypted backup tapes, Accenture provided pendrives
When employees do not pick up their printouts immediately after printing and leave them on the network printer near a corridor, what are the consequences for the information printed out?
The integrity of the information is no longer guaranteed
The availability of the information is no longer guaranteed
The confidentiality of the information is no longer guaranteed
None of these options
Which one of the following is NOT a Lockable Enclosure?
Storage area with locking doors
Document tray
Locking cabinets
All of these options
Information Security is the responsibility of:
All Accenture employees and collaborators
IT Security Department
Security Guards
Top Management
Tailgating is a form of social engineering that allows hackers to:
Watch company’s main entrances 24/7
Obtain unauthorized access to restricted areas
Watch employees as they exit an Office/work site
Follow an employee after he/she has left work
Your Accenture laptop has been stolen. What is the best way to prevent further unauthorized access to your Accenture laptop?
Call the Accenture Security Operations Center (ASOC)
Immediately send an email to your Supervisor/CAL
Change the login password of your account from any other Accenture system
Login to your OneDrive account from another Accenture system and delete all the data
You have just moved to a new Accenture location and have been issued with a new set of passwords. Which one of these methods offers you the safest option for storing them?
Write them down in a notebook
Write them on a sticky note and apply it under your keyboard instead of near your computer
Store them in an Excel file on your computer but give the file a name that is totally unrelated to passwords
Use the password management tool supplied/authorized by Accenture
You have accidentally opened a web link contained in a suspicious email and now your computer is behaving strangely. What action you should take next?
No action is needed
Update and run the anti-virus software
Contact IT Help Desk
Restart your computer
You get a call from the technical support Help Desk saying that they are performing an urgent server upgrade and they ask you for your Accenture Enterprise ID and Password. What should you do?
Refuse and contact your supervisor or Information Security Team
Get the agent’s name and give him/her your login ID and password
Get the agent’s email address and email him/her your login ID and password
Give the agent your password, but not your login
You have a highly sensitive document which you need to email to a trusted third-party. What is the safest way to send it?
Make sure that you scan the document with Accenture approved anti-virus software first
Send the document directly from your Accenture email account without encryption
Send the encrypted document and the password to the third-party via 2 separate emails
Send the document using a file sharing application
A Client has sent you via the physical postal service a USB key which contains project-related information. What is the safest course of action?
Perform a virus scan of the USB key before opening any of its files
Use the USB port in front of your computer instead of the back which enables you to disconnect the USB key rapidly if it is infected
Do not use the USB key. Request the Client to send the file via email or upload it to a secure OneDrive or SharePoint
Insert the USB key but do not click on any of the files
When working from home, how often do you use your non-Accenture computer to work on Accenture/Client material?
Almost every day
At least once a week
At least once a month
Never
How often do you login your Accenture ID using public computers, such as from a library, cybercafé etc.?
Almost every day
At least once a week
At least once a month
Never
How careful are you when you open an attachment in email?
I always make sure it is from a person I know, and I am expecting the email
If I know the person or company that sent me the attachment, I open it
There is nothing wrong with only opening attachments
I scan the attachment using the Anti-Virus then I open it
In your opinion, how do Accenture teams view the topic of Information Security?
It’s not a problem
It’s only a minor problem
It’s a major problem
I’m not sure
Someone from Accenture posts something unusual on the company social media website. What should you do?
Comment on the post
Share the post
Ignore the post
Contact the individual and confirm they posted it
Due to COVID-19, Accenture is now turning to Virtual Private Networks (VPNs) to provide secure connectivity for remote workers. Which Accenture actions below will ensure maximum VPN security?
Keep VPNs up to date by applying latest patches
Notify employees of an expected increase in phishing attempts
Ensure employees use VPN only when necessary to avoid overloading it
All of these options
Which of the following principles is violated if Accenture’s system is not accessible?
Confidentiality
Availability
Access Control
Authentication
There is a scheduled fire drill in the building where you normally work. What should you do?
Call in sick
Excuse yourself by saying you have an urgent deliverable
Participate in the drill
None of these options
Why is it important to have a good understanding of Information Security policies and procedures?
Helps protect individuals from being the victims of security incidents
Provides an understanding of steps to follow in the event of a security incident
Helps to understand levels of responsibility
All of these options
The first step in Security Awareness is being able to ________ a security threat
Avoid
Recognize
Challenge
Log
What should everyone know about information security?
Computer security is part of everyone's job
Report anything suspicious to your System Administrator
Do not ignore unusual computer fun ctioning. It might be a sign of malware
All of these options
What should you do if you think your password has been compromised?
Change your password
Report the incident to the proper authorities, such as a System Administrator
Check other systems that you have accounts on as they may be compromised as well
All of these options
{"name":"ICEG InfoSec Behavior Survey Challenge", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Select below the ONLY place\/places you are authorized to store the final version of Accenture\/Client work documents for future reference., Select below the correct tool to use to restrict access to sensitive information., Select below the tool that you must NOT use to restrict access to sensitive information.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}