0 of 15 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
You have failed the ISO Questionnaire. Please try again.
You have passed the ISO Questionnaire. Please head back to the main course page, where you can download your Certificate of Completion.
When using a BYOD, when is it acceptable to connect to a public wifi network?
Under the Information Classification Policy, who has access to information classed as INTERNAL?
In a secure password, how many characters should be used?
How regularly should passwords be changed?
In the case of a short absence (30 minutes or less) how should information be protected under the Clear Screen policy?
In the case of an extended absence (more than 30 minutes) how should information be protected under the Clear Screen policy?
For which classification of data must a record of destruction be kept?
Who should security incidents be reported to?
How should the Information Security Officer be informed of a major security incident?
Which of the following actions would breach the Clear Screen Policy?
Which of the following methods could be used to protect sensitive data?
What is the most secure method of storing passwords?
What should you do when you receive a suspicious email?
Should minor security incidents be reported to the Information Security Officer?
What should you do if you think your password has been compromised?