Sei sulla pagina 1di 6

Access policy includes the following types of polices Select the correct options.

= intranet,
network n remote access

Users cannot use the internet facility to check their personal mails.=true

How can we ensure that our daily work is backed up?=Place a copy of the days work in a
network folder

In comparison to fingerprint identification machines and smart cards, passwords are


___________ form of authentication. =all of the above=wrong=primitive(wrong)

What is ISPG? Select the correct option.=Information security policies and guidelines

Physical security is not one of the system security policies. True or False?false

Which of the following can be categorised as system security policy? Select the correct
options.1st three

Users can download software that is free and available for download=false

After how many unsuccessful login attempts is the user ID locked:10

Which of the following is a must for users accessing ICICI systems remotely?all of these

Your Company e-mail id is =companys property

It`s fine to check where I have access on the network by trying = false

In a situation, where users needs to share information on ICICI Bank`s systems, with third
parties, then what precautions need to be taken? all four

What`s the procedure for reactivating an locked user ID=1st option(wrong)

When constructing a password, you should= Use phrases or miss spelt words with embedded
numbers and special characters

A computer authenticates the identity of a user by a combination of user id and password.true

Important files should be stored in network home directories to ensure timely backup.true

If I have visited a suspicious looking site and the laptop is behaving abnormally, I should:3rd
option

Where will you find more information on virus security?all of the above(wrong)
-Agreements with third parties may be entered into, provided the Help desk approves of it.false

Storing files in hidden directories:all of the above

You can bypass login script under special circumstances:false

A file bears a recent time and date stamp even though it has not been used for a long time. This
could be because of a computer virus which may have infected your system.=true

It is legal to copy files and software from the desktop in your office to your personal computer
at home if you need to use it for official purpose. False

-Who can install shrink-wrapped software?help desk

-Information Security is a __________________ issue=business risk management

-What according to Russel and Gangemi is the function of a password?prove to the system that
you are who you say you are

Which of the following is an example of a good password?4th option

Each employee is responsible for the contents of his / her e-mail=true

-Which of the following is against the policy

-If I get an e-mail informing me of a new virus alert, I should Immediately forward to everyone I
know in the bank

-After how many unsuccessful login attempts is the user ID locked :6

What is a depth and width of a password?=Width is different types of characters and depth is
selecting a password of challenging meaning and not easily guessable

The e-mail ID which can be used to report frauds, hacking attempts etc.
is=Infosec@icicibank.com

Which are the cheapest form of authentication?=password

If the user loses his laptop he has to immediately report the same to=Physical Security and
bank`s Helpdesk/ Information Security department

If someone requests for a colleagues telephone number who`s not in office, you should=Take
down his number and inform your colleague to call back
Best way to handle storage and magnetic media is to=Label and keep them locked in cabinets

Private related issues for outside entities is policy under the Information Security Policies. True
or False?true

Which of the following is wrong:all

What is an `user ID or user name` used for?4th option

You can download freeware commercial software on your desktop. False

if an employees` identification badge is lost, then the employee must immediately do the
following Select the correct options.1st three

You must store your confidential files in hidden directories.False

If I am transferred to another location it`s fine to shift the PC by myself:false

It`s not important to scan all floppies /CD`s before using them if they are labeled:false

If the access card /badge is lost or you resign from services you need to=Inform the security
personnel immediately

Who must adhere to the Information Security when they use the information technology
resource of ICICI Bank? Select the correct option.all of the above

If a user wants remote access to ICICI Bank information, then, he needs to submit a remote
access request. True or False?true

Someone following you through an access controlled door/entrance is called=2nd option(wrong)

All assets are owned by ICICI and should be returned when you resign:true

Passwords are used in combination with some form of identification like Select the correct
option.=All of the above

Software`s which can be used for a certain trial period after which it has to be purchased is
called =shareware

Downloading free software during lunch time is OK.False

Special access devices provided to the employees like PDA`s, VPN tokens, GTRANS cards,
Blackberry devices on resignation should be=Returned to immediate manager or HR
Project managers should inform system administrators when the tenure of the consultants is
completed or terminated=true

Users can download software that is free and available for download=false

If a temporary employee of ICICI Bank is found to be violating the Information Security Policies,
then disciplinary action can be taken against the employee. True or False? True

Asset media security is part of the e-mail security policy. True or False?true

You have received the quarterly performance report for ICICI Bank. Are you allowed to e-mail
the report to your brother?no

Which of the following is/are violations of Internet Policies=all of the above

Which of the following is best practices=all

If you are aware of a virus attack, then you must immediately notify your colleagues by sending
a mass mail.=false

Access policy includes the following types of polices Select the correct options.except
password policy

How can we ensure that our daily work is backed up?Place a copy of the days work in a network
folder

When do we need to reset our password? Select the correct option. all of the above

If I resign from services of the company or get transferred to another department I


should=Handover the laptop to my manager and inform Helpdesk to update records

Intranet details are public information and can be shared with anyone =false

What are your responsibilities towards the protection of Company assets?all of the above

It`s good practice to ensure that recipient of a sensitive fax is standing next to the fax
machine=True

Movement of assets have to be approved by =is(wrong)FMG(wrong)

Common activities which could be suspicious and should be reported=all

Who is responsible for ensuring that your daily work is backed up?=you
The ideal password consists of=1st three

Ability to connect with a specific web site does not in itself imply that users of ICICI Bank
systems are permitted to visit that site :True

If the access card /badge is lost or you resign from services you need to=inform to security

Which of the following need to be brought to the notice of the System Administrator?all of the
above

Who should be informed if any asset is found missing: helpdesk

Mahavir Kulkarni has recently joined the organisation and now needs to choose a suitable
password for himself. He is very forgetful and has decided to team his name with his year of
birth to make the password Mahavir66. Is this a secure password?No

How can you lock your workstation when you leave your seat briefly?2nd option

Sharing games and programs with co-workers is OK as long as it does not hamper your daily
work=false

Only personnel authorised to download and install software are=system admin(wrong)

Potrebbero piacerti anche