Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
iSecurity Interview Questions and Answers
Home
Questions
iSecurity
0
votes
A top government official is coming to visit you in one of the Company offices. This person is a prospective client for the Company. Select the appropriate choices to handle the visitor access for such officials
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
To whom should you express your concerns and suggestions related to information security at your location?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You receive an e-mail on your Company ID which has a personal business proposal not related to the Company. Is it appropriate to reply?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Your college friend shares with you code for an e-mail agent that can auto-respond to specific users with pre-defined content. Is it appropriate for you to implement this agent in the Company for a specific business purpose?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Due care must be taken for virus check while opening encrypted attachments as compared to unencrypted attachments in e-mail. Is this statement True or False?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You have been working from home on your laptop. What do you need to do when you connect to the Company network?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are on leave when you receive an urgent call from your supervisor asking for your login credentials so that another team member can log in and complete the pending request. What should you do in such a situation?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are attending an important telecon with your client manager. All of a sudden, you hear a fire alarm. What should you do?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
The client has sent you some data on a USB stick. What are the mandatory steps that you need to follow?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
The primary reason for which I am not allowed to store unlicensed music files on Company assets is that:
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You receive a call from your friend asking you to leave immediately as there is some unrest in a certain part of the city. Which of these is the most appropriate action for you to take?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Rohit is a project leader for a team of 30 people. He has to catch an evening flight and so is leaving the office a bit early. He was requested for laptop verification at the security desk while leaving the office. What should Rohit do?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are not allowed to classify any information as Public without authorization. Is this statement True or False?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are under pressure and a bit dejected when you receive an e-mail from a friend on your official mail ID. Your friend has asked you to forward the e-mail to at least ten people. If you do so, a miracle would take place in your life within the next 24 hours, or else a mishap would take place. What should you do in such a scenario?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Where classification is not specified by the client, such information does not require any specific protection. Is this statement True or False?
answered
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-classification
0
votes
Tom has joined a project. He has been assigned a desktop. This desktop was used by Jerry, who is now released from the project. Upon logging on, Tom found personal non-business files stored in the computer by Jerry. If you were Tom, what action would you take?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
How would you protect company/customer-provided laptops during air travel?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You observe that one of your company colleagues keeps sending unsolicited e-mails that are either offensive, obscene, or at times defamatory. What should you do?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You have a business need to use an Internet-based chat messenger not approved by the company. What should you do?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You are taking a printout of a debugging code you have written. What precautions do you need to take?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
While working on the office network, which of the following are not acceptable practices?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You need to mail the estimation sheet created as a response to one RFP to your Onsite BRM. What care will you take while sending the e-mail with regards to its label?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
The information displayed on the company website is classified as company Internal. This statement is True or False.
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
The access-related controls for Confidential classification are more stringent as compared to Internal classification. Is this statement True or False and why?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Why do you need a Business Continuity Plan?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
While working on an assignment where you are an administrator for the database, your password:
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
secuity
0
votes
What data would you typically select for the backup?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Where can you find the company process for Business Continuity Management?
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You are working on a project at a client site. The client has provided you with an e-mail id on their domain, and you are not allowed to access the company e-mail id through the client network. What will you do to access e-mails received on our company ID? Select the appropriate choice.
answered
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
secuity
0
votes
The confidentiality of information is compromised when:
answered
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
To see more, click for all the
questions in this category
.
...