Course name : Information Security Quiz | Course id 7408
Information Security Quiz Questions 1 to 10
1. Your colleague calls you from the TCS entry gate informing you that the security guard at the gate is not allowing her into the premise, since she has forgotten her ID access card What would you do? Select only one answer.
Answer: Ask her to get in touch with Admin and follow the process for ‘Forgot ID card
2. Tom has joined a project. He has been assigned a desktop/laptop, This desktop/laptop was used by Jerry who is now released from the project. Upon logging on, Tom found personal non-business data like music and movie files stored in the computer by Jerry. If you were Tom, what action would you take?
Answer: You should raise an information security incident in the security incident reporting toot
3. You are taking a printout of a debugging code you have written. What precautions do you need to take?
Answers: Collect the printouts immediately. If the paper jams, remove the paper and shred it Ensure that printout is classified properly.
4.You are executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
Answer: Communicate to the customer that information has to be retained beyond project duration with the reason.
5.Where can you find TCS process for Business Continuity Management?
Answer: In IQMS Wiki
6.How should an Information Security Incident be reported?
Answer: Through the Incident Management Tool /through Phone/through
e-mail in Person
7.You observe that one of your TCS colleagues keeps sending unsolicited e-mails which are either offensive, obscene or at times defamatory. What should you do?
Answer: Inform your ISM, raise an incident giving the mail as evidence and
delete it from your mailbox
8.You receive an e-mail on your TCS ID which has a personal business
proposal not related to TCS. Is it appropriate to reply? Select all that apply.
Answer: It is inappropriate since the e-mail is for personal gain and
unrelated to your work No, such activities should be done using personal e-mail IDs only.
9.Where classification is not specified by the client, such information does
not require any specific protection. Is this statement True or False?
Answer: False
10.What are the different information classification categories available in TCS?
Answer: Restricted, Confidential. Internal Use, Public
Information Security Quiz Questions 11 to 20
11.You are going to do a project audit and realize that you do not have access
to the Offshore Development Center (ODC). What should you do?
Answer: Request the Auditee to escort you into the ODC. Make sure that you sign the visitor register when entering and existing the ODC
12.You are informed by the client that sensitive information is being faxed
by them at your office Fax Machine. What are the appropriate actions you should take?
Answers: Request the client to send a cover note, get confirmation on
receipt of cover note from you and then send the actual information
13.Ask for the time of faxing and wait near the fax machine to receive it in person. You have prepared a Design Document for the new product being launched by your customer Customer has not provided any guidance on how such documents should be classified. How will you handle the document?
Answer: Al par with Confidential classification
14.As a TCS associate, you have to transmit confidential information for business purpose to the client. What precaution should you take.
Answer : Ensure that information is sent by taking appropriate precautions like encryption, password protection and so on. Take business approval when required
15.You are working overseas at a client location and need to use the data when you return to your home country. How will you ensure data availability?
Answer: Carry the data with you with client permission
Course name : Information security Quiz | Course id 7408
16.You are working on a project and require logging on to environment
managed by the client. The client has provided you with a single user ID
and your entire team uses the same ID to login to the environment Which of
these statements is correct in this context
Answer: Credentials should never be shared. You should consult your OU ISM in such scenarios
17.You are going on vacation. Your user-id has special privileges required to
do certain specific tasks on the project. What should you do to ensure services are not impacted when you are on vacation?
Answer: Get the privileges transferred to the user id of your backup team member. Do not disclose your password to anyone
18.When you have to retain the information, which factors should be considered for retention period?
Answers: TCS Retention policy
Regulatory requirements
Project duration
Contractual requirements
19.You are working on a project at a client site. The client has provided
you with an e-mail id on their domain, you are not allowed to access your
TCS e-mails through the client network. What will you do to access e-mails
received on your TCS ID?
Answer: Get TCS e-mails configured off your Smartphone
20.You can add any custom emoticon to instant messaging by downloading from internet. Is this statement True or False?
Course name : Information Security Quiz | Course id 7408
Answer: True
21.When you are going on a long leave, what are the appropriate
actions that you should take?
Answer: Transition all the activities and relevant information/data
to someone within the team and delegate access to mails so that you
do not need to share your credentials
22.You are searching the internet for some information. After clicking
a link on one page you become suspicious that it may have triggered a virus
or something which is wrong. What should be your immediate reaction?
Answer: Isolate the machine from the network (Disconnect home the network
Call up Information Security Manager and wait for instructions.
23.It is always acceptable to send business information from your
customer provided email id to your TCS email id. Is this statement True or False?
Answer: False
24.Your colleague is on leave and the PM requests you to use your colleagues
ID for login to complete the work. What will you do?
Answer: You will refuse to use someone else’s ID and password to do work
25.You are working in a shift and your colleague in the next shift is delayed
due to traffic condition. Your colleague calls you and asks you to download an
urgent e-mail from the client sent on his e-mail / How will you avoid such sharing
of e-mail IDs?
Answer: Use the delegate/backup facility
26.Use a group mall id or Mail-in DB with required associates in the
team as members You are attending an important telecon with your client manager. All of a sudden, you hear a fire alarm. What should you do?
Answer: Inform the client at other end about the fire alarm and evacuate
the building using closest fire exit along with others
27.Where can you find TCS process for Business Continuity Management?
Answer: In iQMS Wiki
Course name : Information security Quiz | Course id 7408
28.What is referred to as social engineering?
Answer: Using people skills to obtain proprietary/confidential information
29.What is referred to as social engineering?
Answer: Using people skills to obtain proprietary/confidential information
30.What must you do before leaving your workplace even for a short break?
Answer: Lock your workstation before leaving
Information Security Quiz Questions 30 to 40
31.The printer got jammed while you were taking prints of a project plan of
an upcoming project. You should inform the Infrastructure Services (IS) and
go back to your work, asking them to get the prints once the problem is sorted
out. Is this statement True or False?
Answer: False
32.You are responsible for taking the backup of the information of your project.
Which of these statements is correct?
Answer: If sensitive data is being backed-up, data must be encrypted for
confidentiality purpose You must log every backup so that it can be used for
any eventuality and results of restoration check performed.
33.Backup must be kept at remote sites so that in case of any emergency in primary site, backups are available at another location. When you share the information with third party, you should inform the recipient that further cascade of the information is not permitted unless authorized by TCS, Is this statement True or False?
Answer: True
34.While working on an assignment where you are administrator for the database,
your password ?
Answer: Should never be disclosed to anyone or shared with anyone
Course name : Information Security Quiz | Course id 7408
36.When you are going on a long leave, what are the appropriate actions that you should take?
Answer: Transition all the activities and relevant information/data to someone within the
team and delegate access to malls so that you do not need to share your credentials
35.You are working on a project at a client site. The client has provided you with
an e-mail id on their domain, you are not allowed to access your TCS e-mails through the client network. What will you do to access e-mails received on your TCS ID?
Answer: Get TCS e-mails configured on your Smartphone.
37.Who is responsible for classifying information?
Answer: Owner of the information
38.The access related controls for Confidential classification are more stringent
as compared to Internal classification. Is this statement True or False and Why?
Answer: TRUE, as the business impact due to unauthorized disclosure of Confidential information is more than Internal information
39.You want to start a blog to discuss delivery issues in your project
or relationship. What would you do?
Answer: Use TCS internal social media (such as Knome) and post the
query in the right community.
40.You are under pressure and a bit dejected when you receive an e-mail
from a friend on your official mail ID. Your friend has asked you to forward
the e-mail to at least ten people. If you do so, a miracle Would take place
in your life within the next 24 hours, or else a mishap would take place What
should you do in such a scenario?
Answer: You should ignore such e-mails and delete them You should not forward
or even solicit e-mails that are unrelated to business activities or for personal gain
Course name : Information Security Quiz | Course id 7408
Follow Us On YouTube for Information Security Quiz video Course
Generative AI E1 Answers Course id 77469 Easy Now
You want to start a blog to discuss delivery issues in your project
or relationship. What would you do?
Answer: Use TCS internal social media (such as Knome) and post the
query in the right community.
Your colleague calls you from the TCS entry gate informing you that the security guard at the gate is not allowing her into the premise, since she has forgotten her ID access card What would you do? Select only one answer.
Answer : Ask her to get in touch with Admin and follow the process for ‘Forgot ID card
You are going to do a project audit and realize that you do not have access
to the Offshore Development Center (ODC). What should you do?
Answer : Request the Auditee to escort you into the ODC. Make sure that you sign the visitor register when entering and existing the ODC