ISO Questionnaire
This quiz will contain 15 total questions.
We will ask you a series of questions that will be related to the information you have read on the previous page. Our knowledge on this topic is vital for remaining aware of any security threats to the company.
To complete this quiz, you must get all questions correct. If you do not manage to get all questions correct, you can start over the quiz as many times as you would like to.
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Course 1, Module 5 0%
- ISO 0%
-
You have failed the ISO Questionnaire. Please try again.
-
You have passed the ISO Questionnaire. Please head back to the main course page, where you can download your Certificate of Completion.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
When using a BYOD, when is it acceptable to connect to a public wifi network?
CorrectIncorrect -
Question 2 of 15
2. Question
Under the Information Classification Policy, who has access to information classed as INTERNAL?
CorrectIncorrect -
Question 3 of 15
3. Question
In a secure password, how many characters should be used?
CorrectIncorrect -
Question 4 of 15
4. Question
How regularly should passwords be changed?
CorrectIncorrect -
Question 5 of 15
5. Question
In the case of a short absence (30 minutes or less) how should information be protected under the Clear Screen policy?
CorrectIncorrect -
Question 6 of 15
6. Question
In the case of an extended absence (more than 30 minutes) how should information be protected under the Clear Screen policy?
CorrectIncorrect -
Question 7 of 15
7. Question
For which classification of data must a record of destruction be kept?
CorrectIncorrect -
Question 8 of 15
8. Question
Who should security incidents be reported to?
CorrectIncorrect -
Question 9 of 15
9. Question
How should the Information Security Officer be informed of a major security incident?
CorrectIncorrect -
Question 10 of 15
10. Question
Which of the following actions would breach the Clear Screen Policy?
CorrectIncorrect -
Question 11 of 15
11. Question
Which of the following methods could be used to protect sensitive data?
CorrectIncorrect -
Question 12 of 15
12. Question
What is the most secure method of storing passwords?
CorrectIncorrect -
Question 13 of 15
13. Question
What should you do when you receive a suspicious email?
CorrectIncorrect -
Question 14 of 15
14. Question
Should minor security incidents be reported to the Information Security Officer?
CorrectIncorrect -
Question 15 of 15
15. Question
What should you do if you think your password has been compromised?
CorrectIncorrect