SAQ – COMPUTER SECURITY 


Hello Friends if you are looking for SAQ – COMPUTER SECURITY Infosys Answers | SAQ – COMPUTER SECURITY Multiple Choice Questions with answers | SAQ – COMPUTER SECURITY Objective type questions with answers | SAQ – COMPUTER SECURITY Infosys Questions Answers then you will get answers here.

Click Here to Join Our Telegram Channel For More Infosys Question Answers

You accidentally find appraisal information of your team mate in the shared project folder. What would you do?

a. You probe further to see how your team mate has been
rated
b. You take a screenshot of the data and email it to your
team mate to confirm if this is really his/her rating
c. Log an AHD (Advanced Help Desk) request with CCD
(Computers and Communication Division) to rectify the
issue
d. You delete the data to ensure it is not misused
e. You promptly notify your manager about this
unwarranted access to ensure timely remediation of the
issue

Answer: E

What are the primary advantages of adhering to Secure SDLC
best practices?

a. More secure software as security is a continuous concern
b. Awareness of security considerations by stakeholders
c. Early detection of flaws in the system
d. Cost reduction as a result of early detection and
resolution of issues
e. All the above

Answer: E

Which of the below action/s exemplify Clear Desk and Clear Screen policy?

a. Locking your system when you are away from your desk

b. Leaving confidential/sensitive data on your desk, in your absence

c. Erasing information from the whiteboard once your meeting/discussion is over

d. Noting down passwords on sticky notes or on paper

Answer: AC

Your colleague tells you about a vulnerability in one of the internal applications of Infosys due to which one can access the personal information of Infoscions. What will you do?

a. Exploit the security loophole to try and find out the confidential information about other Infoscions

b. Post the details on an online forum to get help on how to best exploit the vulnerability.

c. Post it on Infosys internal communication platform/s to warn fellow Infoscions from using the application

d. Report it to ISG via AHD (Advanced Helpdesk)/global helpdesk/email to iCERT@infosys.com

Answer: D

You come across a useful and free reporting utility which can be easily downloaded from the Internet to create appealing project reports. Will you install it?

a. Yes, only if there is a valid business justification.

b. Yes, only if you are JL7 and above.

c. No, since this could lead to downloading of malware Instead you can check an alternative utility in the software house or raise a request in Software Security Validation Portal (SSVP) portal for manager approved exception.

d. Yes, as you plan to use only for trial period.

e. Yes, if you have privilege access/admin rights you can install the software

Answer: C

Which of the following is one of the best password security practices?

 a. Always keep strong but easy-to-remember and easy-to- guess password. Keep same password for multiple accounts


b. Always keep strong but hard-to-remember and easy-to- guess password. Never use same password for multiple accounts

c. Always keep strong but easy-to-remember and hard-to- guess password. Never use same password for multiple accounts

d. Always keep strong but hard-to-remember and hard-to- guess password. Keep same password for multiple accounts,

Answer: C

You need to take an emergency leave. Since you are working on a critical task, your manager seeks your credentials to avoid impact of services to the client in your absence. What action would be most appropriate to ensure security and continuity of services so that the client deliverables are not impacted?

a. You will refuse to share the password and assure your manager that you can be reached over a call to obtain the credentials in case of any urgent deliverables

b. You will inform your manager that this will amount to security violation. Alternatively, client approval can be obtained for creation of an alternate user ID with similar privileges for another team member to ensure continuity of deliverables

c. You will not share your credentials with anyone under any circumstances even if it impacts the business

d. Since this is required for client deliverables and is asked by your manager, you will share your credentials with him/her

Answer: b

During a client audit, the external auditor seeks your credentials. How would you respond?

a. Share it, else it will be recorded as a non-conformance

b. Politely decline it, as safeguarding your password is your responsibility. Passwords should never be shared with others under any circumstances

c. Since the auditing agency would have signed the NDA (Non-Disclosure Agreement) with Infosys before the audit, it is permitted to share as long as it is changed immediately after the audit

d. Obtain written approval from the client, and your manager before sharing the credentials

Answer: b

Does Infosys have the right to monitor, investigate and wipe the corporate data from personal devices / BYOD (Bring Your Own Device) in a scenario like loss of device etc.as per the Acceptable Usage Policy (AUP)?

yes

What is the most suitable MS Azure Information Protection (AIP) label while sharing a presentation with project details with your manager?

a. Use AIP (Azure Information Protection) label ‘Confidential’ and select appropriate permissions by opting for a suitable sub level

b. Use AIP (Azure Information Protection) label ‘Internal’ and select appropriate permissions by opting for a suitable sub level

c. Use AIP (Azure Information Protection) label ‘Critical’ and select appropriate permissions by opting for a suitable sub level

d. Use AIP (Azure Information Protection) label ‘Restricted’ and select appropriate permissions by opting for a suitable sub Jevel

Answer: a


Leave a Reply

Your email address will not be published. Required fields are marked *