This quiz will contain 15 total questions.
We will ask you a series of questions that will be related to the information you have read on the previous page. Our knowledge on this topic is vital for remaining aware of any security threats to the company.
To complete this quiz, you must get all questions correct. If you do not manage to get all questions correct, you can start over the quiz as many times as you would like to.
0 of 15 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
You have failed the ISO Questionnaire. Please try again.
You have passed the ISO Questionnaire. Please head back to the main course page, where you can download your Certificate of Completion.
When using a BYOD, when is it acceptable to connect to a public wifi network?CorrectIncorrect
Under the Information Classification Policy, who has access to information classed as INTERNAL?CorrectIncorrect
In a secure password, how many characters should be used?CorrectIncorrect
How regularly should passwords be changed?CorrectIncorrect
In the case of a short absence (30 minutes or less) how should information be protected under the Clear Screen policy?CorrectIncorrect
In the case of an extended absence (more than 30 minutes) how should information be protected under the Clear Screen policy?CorrectIncorrect
For which classification of data must a record of destruction be kept?CorrectIncorrect
Who should security incidents be reported to?CorrectIncorrect
How should the Information Security Officer be informed of a major security incident?CorrectIncorrect
Which of the following actions would breach the Clear Screen Policy?CorrectIncorrect
Which of the following methods could be used to protect sensitive data?CorrectIncorrect
What is the most secure method of storing passwords?CorrectIncorrect
What should you do when you receive a suspicious email?CorrectIncorrect
Should minor security incidents be reported to the Information Security Officer?CorrectIncorrect
What should you do if you think your password has been compromised?CorrectIncorrect