
Cyber Policy quiz 3
Authored by Nivedita Newar
Instructional Technology
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Zhang's business case to implement an exam proctoring software has been approved by UNSW management. He wants to understand which mandatory IT asset management requirements need to be documented from a cyber security perspective: (Select multiple correct answers)
connections and data flows to and from the service.
vulnerabilities identified and/or mitigated.
cost of storage for the system
cyber security controls, their function, and their configuration.
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Deepak has obtained approval for his business to implement a new Information Resource/Application handling highly sensitive UNSW data, hosted in UCloud-AWS). He is required to do the following: (multiple correct answers)
Review and update the information resource attribute fields in inventory on a periodic basis, as requested by cyber security team.
Evaluate the assets "Inherent Cyber Risk Rating" classification using the Cyber Security Risk Management Standard
Record the information resource in IT's central asset inventory.
Update the information resource attribute fields in the asset inventory upon asset changes, upgrades, decommissioning.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As per the "Cyber Security Standard-Information Asset Management", all UNSW Business Divisions and Faculty's "Low Cyber Risk rated Information Resources must be recorded in an inventory.
True
False
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
High Cyber Risk Rated UNSW Information Services and supporting UNSW Information Assets must be reported to the UNSW IT ________ team for recording in the central UNSW IT inventory.
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Mary Grace is business owner of learning management software(LMS), classified as High Cyber Risk rated information resource. One of the software has reached end of life/support but she is insisting on continuing to use it because it has been used for more than 9 years. What is your advice to her? (multiple correct answers)
Since the LMS is currently non compliant with cyber security standards, it must be isolated from the network
that LMS must have active maintenance or support contracts with the vendors or manufacturers.
that LMS must be managed in accordance with the Cyber Security Standard – Risk Management.
that her business division must not use end-of-life and/or end-of-support Information Resources, including the LMS.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As per Cyber Security Standard-Information Asset Management, all UNSW Business Divisions and Faculty's "High Cyber Risk rated Information Resources" must be recorded in "IT's" central asset inventory
True
False
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
The person responsible for defining, operating, measuring, and improving a UNSW Information Service and associated cyber security controls is called (select multiple correct answers)
Information Asset Owner
Information Service Owner
System Owner
IT service owner
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?