Data you create on the VES/VSIS System remain the property of?
Myself
VES/VSIS
Internal IT
Human Resource
User is prohibited from copying sensitive data from
Email
Calender
Drive
All/any other
Users must report any weaknesses in information security, any incidents of possible misuse or violation of this policy to the proper authorities such as (select any 2)
VSIS IT Steering Committee
ISMS Manager (ISM)
HR
Finance
Sales
Users ______ attempt to access any information contained in the company’s information systems for which they do not have authorization or explicit consent of the owner of the information
Must
Must not
It is _______ to connect personal devices (such as personal USB sticks, CDs, hard drives, laptops etc.) or software on VES/VSIS’s information assets without approvals.
Okay
Not okay
Users must not take information that belongs to VSIS/VES out of its premises without appropriate approval and/or clearance from
Head of Division
Your Friend
The Security Officer
In the event the device is lost or stolen, or data on device or cloud is believed to have been compromised, the incident must be reported to the (Select any 2)
IT department
IT Helpdesk
HR
Everyone
The Management
Sharing, transferring, and distribution of information protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations are,
Lightly Illegal
Strictly Prohibited
Not Prohibited
Slightly Prohibited
Accessing VES/VSIS-systems through Hotspot and VPN are,
Lightly Illegal
Strictly Prohibited
Not Prohibited
Slightly Prohibited
You can use any network and security tools as your wish
Yes
No, need approval from VSIS/VES
Playing computer games, that is not part of an authorized and assigned company research or project is
Strictly Prohibited
Okay
Illegal
Lightly Prohibited
It is ___________ to Engage in criminal activities including but not limited to hacking, cracking, sniffing, or disrupting VES/VSIS or third-party systems when you're bored
Strictly Prohibited
Not prohibited
Lightly Prohibited
 
While being honest, humble, and trustworthy are DOs, Sending derogatory or inflammatory remarks about an individual’s race, age, disability, religion, national origin, physical attributes, or sexual preference and Using abusive, profane, or offensive language are ____
DON'ts
Dos
You need to send an personal email to a friend, you would use your
Personal Email Account
VES/VSIS Email Account
Users that receive any emails with malicious or harassment content such as spam, phishing, fraud, offensive and tasteless comments, malware, disruptive messages etc. From any other VES/VSIS employee should report the matter to the ________
IT
HR
Both
F) Users that receive any emails with malicious or harassment content such as spam, phishing, fraud, offensive and tasteless comments, malware, disruptive messages etc. Content from an external party (not part of VES ) shall immediately notify the _______ department by forwarding such email and delete them.
HR
QA
IT Department
Finance
Out of these, what can be considered as a Strong password?
1234567890
19990816 (Your birthday)
(NIC Number)
ILoveMyCatLordStewart99513
It is okay to share your passwords with co-workers, any staff member including superiors or IT Staff in a direct or indirect manner if they ask you.
True
False
{"name":"Data you create on the VES\/VSIS System remain the property of?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Data you create on the VES\/VSIS System remain the property of?, User is prohibited from copying sensitive data from, Users must report any weaknesses in information security, any incidents of possible misuse or violation of this policy to the proper authorities such as (select any 2)","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.