ISMS
ISMS Policies
ISMS Presentation
HR Dept
HR Policies
English Learning
Events
Photos
EB Emergency
ISMS Policies and controls
ISMS Policies and controls
Personal Details:
Your Name
Your Email
Official Mail ID
Employee Id
Department :
— Select Department—
AdminSupport
ASAP Prakash
Asap-Kumar
Asap-Sikkanthar
Australia
BDE-Dean
Bde-Jeneefer
BDE-Mint
Bde-Sandy
BV Contract Read
BV-Reg
BV-Takeoff
Canada Processing
CJ
ContentWriting
CustomerSupport
Denver
Dodge Takeoff
Edgar
FinnTask
HR
IMS
IT Team
Medical Billing
P&S
Property Management
RCM
Retail Support
Seo
Software Team
TakeOff
TeeChip
UK Accounting
US Accounting-Hema
US Accounting-Murali
US Accounting-Sangeetha
US Accounting-Santhosh/Supriya
US Accounting-Smitha
US Accounting-Varun
US Policy Processing
Web design
Xbrl
Employee Type
New Joinee
Existing Employee
1) What is security Incident?
Successful unauthorized access
Successful authorized access
Anything which is not violating the policy
All the above
2) What ISO Standard Our Integra Global Possess?
ISO 9001:2015
ISO 27001:2022
ISO 14001:2015
ISO 20007:2013
3) What is ISMS?
International Service Mechanisms
Information Security Management System
Inter Service Management System
Intranet Service Management System
4) Components of ISMS
CIB
CIM
CIO
CIA
5) What is vulnerability?
Security weakness in Information System
Potential negative action
Uncertainty of Information system
All the above
6) What is ISO?
Information Organization for Standardization
Information Standardization Organization
International Organization for Standardization
International Standardization Organization
7) What are the consequences of Security breach?
Immediate Termination
Black listed
Criminal Proceedings
All the above
8) What is Clear Screen Policy?
Should Lock the System when away from the Work place
Should clear the Screen by cloths
Should log out the system
9) What are the controls in ISMS?
Organizational
Technological
People
Physical
All the above
10) The Importance of ISO 27001
Protects the information from various threats
Minimize the financial losses
Creates Business Opportunities
All the above
11) _____is related following statement "To prevent data from unauthorized alteration"
Confidentiality
Integrity
Accountability
Availability
12) What is Tailgating?
One User, One Access
One User, Multiple Access
Multiple User, One Access
None of the above
13) Types of Vulnerabilities
Process vulnerabilities, One Access
Insecure Practices
Insecure development process
Implementation flaw
All the above
14) Can we click the link if we receive from unauthorized email?
Yes
No
15) For an emergency report regarding incidents we need to contact
Boss
ISO team or CISO
Either boss or Security Manager
None of the above
16) What is the expansion of CIA?
Controllability, Integrity, Availability
Confidentiality, Integrity, Availability
Confidentiality, Intensity, Availability
Confidentiality, Integrity, Accountability
17) From the below ______ is not allowed inside of the production floor.
Mobile Phones
USB
Smart Watches
All the above
18) _____________ is Email id for incident reporting.
incidents@igs.net
Incidents@integraglob.com
Incidentreporting@globalintegra.net
Reportingincidents@globalintegra.net
19) What is Clear Desk Policy?
Should clear the desk by cloth
Should not keep confidential documents in desk
Should remove all the files from desktop
All the above
20) How Often should I change the password?
Never
Every Week
Every Month
Every Year
21) If you receive a suspicious email, should you?
Reply to it
Open the attachment
Click the link
Report to IT Support
22) True or False: Physical Security is NOT related to Information Security
True
False
23) What does PDCA stand for?
Plan, Design, Confirm, Act
Plan, Do, Check, Act
Prepare, Do, Critique, Appraisal
Prepare, Do, Critique, Assess
24) According to ISO 27001:2022, which of the following is a primary objective of organizational controls?
Prevent unauthorized access to information assets.
Ensure the availability and usability of information systems.
Maintain the integrity of information throughout its lifecycle.
Promote a culture of awareness and responsibility for information security within the organization
All the above
25) Why are physical controls important in an ISMS?
To keep employees motivated and productive.
To deter unauthorized access to physical IT assets.
To improve the aesthetics of the workplace.
All the above
`
Submit
Reset