ISMS Awareness Exercise 2025 (IT)

及格

分數: 100
題數 : 總共 47 題, 答對 47 題, 答錯 0 題
Created with Highcharts 5.0.14答對占比: 100.0%
檢視我的答案
1.

Which area does ISO 27017 primarily focus on for information security management?

解析:
2.13 分
2.

Which of the following security responsibilities should you (cloud service customer) expect from your cloud service provider?

解析:
2.13 分
3.

What should you (cloud service customer) expect from your cloud service provider when it comes to the protection of your data?

解析:
2.13 分
4.

What is the difference between cloud service providers and customers (Infrastructure as a Service (IaaS))?

解析:
2.13 分
5.

If a cloud service security incident occurs, how should we (cloud service customer) respond according to ISO 27017?

解析:
2.13 分
6.

How should you as a cloud service customer ensure the security of sensitive data in the cloud according to ISO 27017?

解析:
2.13 分
7.

How should we (cloud service customer) manage the risks of using these services?

解析:
2.13 分
8.

Which of the following physical security measures should you (cloud service customer) expect the provider to implement for the data centers?

解析:
2.13 分
9.

How should we (cloud service customer) handle backups for our data?

解析:
2.13 分
10.

What is our role as cloud service customers in security monitoring?

解析:
2.13 分
11.

An information system is an virtual/ physical environment which

解析:
2.13 分
12.

A good security standard “90/10” Rule, which refers to:

解析:
2.13 分
13.

Information Security Management System (ISMS) is a framework under which ISO standard?

解析:
2.13 分
14.

Titansoft has been ISO certified since 2012, and why do we do so?
(i) Ensuring our success in award hunting
(ii) Ensuring our work are cumbersome
(iii) Ensuring our information security practices are acceptable under ISO standards
(iv) Being certified also help our customers to save efforts in their license(s) application

解析:
2.13 分
15.

Which of the following is NOT mentioned in the Titansoft Information Security Policy?

解析:
2.13 分
16.

3 principles of ISMS(“CIA Triad”) consists:
(i) "Confidentiality", restricting unauthorized access to information system
(ii) "Closure", restricting all access to information system
(iii) "Integrity", ensuring there are no unintentional or malicious altering of information/ data in the information system
(iv) "Invisibility", masking all identities of users
(v) "Availability", ensuring access to the information must be available for the authorized personnel when they need the information
(vi) "Amaze", ensuring others are amazed by your capabilities

解析:
2.13 分
17.

ISMS uses PDCA cycle and what is this cycle about?
(i) PDCA cycle consist of 4 stages, namely PLAN, DO, CHECK, ACT
(ii) PDCA cycle consist of 4 stages, namely PLAY, DISCORD, CRACK, ADVANCE
(iii) PDCA a repetitive cycle without much purpose
(iv) PDCA is an iterative improvement cycle

解析:
2.13 分
18.

What is the true purpose of Corrective Action Requests(“CAR”)?

解析:
2.13 分
19.

Non-conformity ticket (NCT) is a correction of actions. Which of the following will be issued NCTs?

解析:
2.13 分
20.

You notice that the office door cannot be locked, which could allow unauthorized individuals to enter, what should you do?

解析:
2.13 分
21.

When you see some unfamiliar face loitering around work area without access pass, what should you do?

解析:
2.13 分
22.

What should you do if you forget to bring your access pass to work?

解析:
2.13 分
23.

If you lose your access pass, how soon should you report it to OD?

解析:
2.13 分
24.

When using computers, what behavior could put your information at risk?
(i) Keep anti-virus software up-to-date
(ii) Use and turn on firewall protection
(iii) Install computer software updates
(iv) Install Peer to Peer (P2P) software
(v) Use thumb drive
(vi) Consult with IT dept before installing any software

解析:
2.13 分
25.

Which of the following about Internet Usage is Correct?

解析:
2.13 分
26.

When received spam mail from stranger, what should you do?

解析:
2.13 分
27.

Which of the following applies to the email usage policy?
(i) Use official email address for any personal subscription purpose
(ii) Pass along funny e-mails or chain letters
(iii) Use official mail for business purposes only
(iv) Be cautious even when opening attachments from your peers
(v) Share company email content outside of the company
(vi) Check email at least 2 times daily

解析:
2.13 分
28.

Instant messaging can be hazardous in which of the following ways?

解析:
2.13 分
29.

When transmitting sensitive data, which of the following practices should be adopted to protect user data?

解析:
2.13 分
30.

How to use removable media safely?

解析:
2.13 分
31.

Which of the following is a good Data Backup practices?
(i) Keep your backups in the same physical location as your computer
(ii) Make regular back-up of critical data and software program based on data criticality, e.g., daily, weekly, monthly
(iii) Store back-up disks at a geographically separate and secure location
(iv) Put confidential information in public shared folder
(v) Prepare for disasters by testing the ability to restore data from back-up disks
(vi) Backup illegal data and files without license

解析:
2.13 分
32.

You need to store some work-related documents. Where CAN'T you store?

解析:
2.13 分
33.

Sensitive data/ information that are no longer needed, we will have to dispose them. What should you do to dispose those information?

解析:
2.13 分
34.

What is the risk of pirated software?

解析:
2.13 分
35.

How to prevent software piracy and copyright infringement?

解析:
2.13 分
36.

What is NOT in compliance with VPN usage regulations?

解析:
2.13 分
37.

When setting password, you should NOT?

解析:
2.13 分
38.

Passwords can be protected by

解析:
2.13 分
39.

Which of the following about phishing is TRUE?
(i) Phishing is one type of social engineering that uses e-mail or websites to trick you into disclosing personal sensitive information.
(ii) Phisher sending emails or pop-up messages which directs the you to a fake website that looks just like the real website.
(iii) The fake website tricks you to submit your personal sensitive information.
(iv) Phisher uses your personal information to steal your identity.

解析:
2.13 分
40.

What action may lead to phishing attacks?

解析:
2.13 分
41.

Which of the following is a potential phishing attempt?

解析:
2.13 分
42.

Which of the following is NOT a clear desk and clear screen policy?

解析:
2.13 分
43.

When using Zoom, which of the following is considered non-conformity?

解析:
2.13 分
44.

You’ve just received a notification that IT has created a new GCP account for you. According to the company’s security policy, what should you do next?

解析:
2.13 分
45.

Security incidents include virus attacks, hacking, information leakage, etc. When you discover a security incident, what should you do?

解析:
2.13 分
46.

You need to upload data for a new project to a cloud service. How should you ensure security?

解析:
2.13 分
47.

Employees traveling the following countries (China, Macau, Hong Kong and USA) must inform MIS via the "Staff travel policy (China, Macau, Hong Kong and USA)" page in confluence

`
解析:
2.13 分