
Cyber Policy Quiz 2
Quiz
•
Instructional Technology
•
Professional Development
•
Medium

Nivedita Newar
Used 5+ times
FREE Resource
Enhance your content
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 2 pts
Rosaline is implementing a solution in Faculty of Engineering which is a 30 million dollar project. She is performing a high level business case and wants to incorporate cyber security principles in the planning. Which 2 principles should she focus on? (select two correct options)
UNSW Information Resources must be designed, deployed, maintained, and decommissioned according to their cyber security risk and any associated control requirements
All access to UNSW Information Resources must be authorised, restricted based on need, and periodical review is not required
Cyber security incidents must be identified, reported, contained, eradicated, and recovered from, in a timely manner
Business continuity and disaster recovery plans must be developed, documented, and enacted when required and may allow acceptable increase in cyber security risk
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many levels of Cyber Security Risk Rating exists for UNSW Information Resources, derived from inherent risk as per the UNSW Cyber Security Risk Framework?
3
4
2
5
3.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
Which of the following UNSW Information Resource types delivered by a vendor are covered by the Cyber Security Risk Management Standard?
Endpoints (workstations, laptops, mobiles, IoT and VDI)
Data Services and Storage Services (including PaaS).
Networks and Network Devices (including SDN and Cloud).
Research journals
Classroom whiteboard
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Who has UNSW-wide authority to establish mandatory Cyber Security Standards and Guidelines and determine the consultation process (in accordance with the UNSW Policy Framework Policy),
Chief Information Officer
Chief Information Security Officer
Vice- Chancellor
VP, Operations
5.
MULTIPLE SELECT QUESTION
45 sec • 3 pts
The Chief Information Security Officer has UNSW-wide accountability and authority for:
assign UNSW-wide management responsibilities for cyber security
the design, implementation, and oversight of UNSW cyber security strategy, plans, programs, capabilities, and controls
supporting UNSW management in identification, assessment, treatment, and reporting of cyber security risks.
ensuring the Cyber Security Policy, Cyber Security Standards and Cyber Security Guidelines conform with the requirements of any relevant International Standard and its defined scope within UNSW.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
As per the Cyber Security Policy Deputy Vice-Chancellors, Vice-Presidents, Deans, and the Rector UNSW Canberra are accountable for the:
identification and management of cyber security risk within their area of accountability, including where necessary obtaining guidance and support from the Chief Information Security Officer.
assignment of Business Owners for all UNSW Information Resources within their area of accountability.
annual attestation of compliance to the Cyber Security Risk Management Framework, for High Cyber Security Risk Rated UNSW Information Resources within their area of accountability, in accordance with the Cyber Security Standard – Risk Management, and where necessary obtaining guidance and support from the Chief Information Security Officer.
All of the above
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
John is a business owner trying to implement an AI tool in the Finance division. What is John responsible for? (multiple correct answers)
ensuring all UNSW Information Resources within their area of responsibility have Cyber Security Risk determined
no need for reporting and escalating identified cyber security risks in accordance with the Cyber Security Standard – Risk Management.
overseeing all access to UNSW Information Resources within their area of responsibility in accordance with the Cyber Security Standard – Identity and Access Management.
ensuring UNSW Information Resources within their area of responsibility are compliant with all applicable cyber security laws and regulations, including those relating to critical infrastructure
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
17 questions
Security Plus 1-03
Quiz
•
Professional Development
20 questions
Module 1 - Modern Management
Quiz
•
Professional Development
15 questions
ABCTE 1.4
Quiz
•
Professional Development
25 questions
Cyber Policy quiz 3
Quiz
•
Professional Development
15 questions
Badging Review 5.0
Quiz
•
Professional Development
17 questions
DigiComp 2.2 Quiz
Quiz
•
Professional Development
15 questions
Cryptography Chap-1
Quiz
•
9th Grade - Professio...
15 questions
Cloud migration prerequisite
Quiz
•
University - Professi...
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade