No student devices needed. Know more
15 questions
What does ASOC stands for?
Accenture Secured Operational Center
Accenture Secured Operations Center
Accenture Security Operational Center
Accenture Security Operations Center
This Client Data Protection role is delegated responsibility for controls managed at the location or contract/service level.
Control Owner
Security Lead
Operational Support
Solution Architect
When working from home, below are the guidelines for using secure networks EXCEPT:
Create a strong network password of 8 characters or more and only share it with people you trust.
When connecting to new network, select "do not allow my computer to be discoverable by other devices on the network".
Change the default administrator password on your router to one that is easy to memorize
Enable WPA2 or WPA3 on your router to encrypt your online activity.
Restricted data contains highly sensitive, strategic Accenture information that is material and non-public. What is one example of this data?
Internal Project Deliverables
Financial Statements
Network Designs
Personal Data
Who monitors all outgoing actions being done to all Accenture machine?
Accenture CyberSystem Team
Accenture CyberSecurity Team
Accenture ComputerSystem Team
Accenture ComputerSecurity Team
Who is assigned to establish Client Data Protection (CDP) processes and coordinate CDP activities across all parts of the Client Account.
Accountable Managing Director
Accountable Delivery Director
Account Information Security Lead
Account Information Delivery Lead
CIRT stands for _____________________________
Critical Incident Response Team
Cyber Incident Response Team
Cyber Issue Response Team
Critical Issue Response Team
Resource must call the ASOC hotline if you think you might have done something that could cause a security breach.
ASOC at +1-202-729-0645
ASOC at +1-202-728-0645
ASOC at +1-202-729-0646
ASOC at +1-202-728-0646
If the team need to use non-standard software, one must file a NSSR and wait for approval before installation. NSSR stands for ____________________
Non-Standard Service Request
Non-Standard Software Request
Non-Standardized Service Request
Non-Standardized Software Request
This is a level of data classification wherein sensitive data intended for business use only by specific groups or teams of employees on a need-to-know basis.
Unrestricted
Restricted
Confidential
Highly Confidential
In Catch a Phish training, there are mentioned important tips to remember for suspicious/phishing emails EXCEPT.
Always be sure to look for an External tag in the subject of the email.
Look for unfamiliar senders. This can either be in the sender's name or in a spoofed domain.
Look for emotional motivators, sense of urgency phrases, or promotion to entice you.
None of the above
If you fail multiple security test, you can be added to PPP where you will have restricted mailbox privileges and receive additional testing. What does PPP stands for?
Protecting Phishing Protocol
Phishing Protection Protocol
Protecting Phishing Program
Phishing Protection Program
The most reliable way to identify an external email is:
Check if the email has a different font and logo.
Look for the [External] tag and the External Email header
Check the email address of external sender
There is no way to reliably identify external email
Installation and downloading of unauthorized software is considered as Serious to Grave offense.
TRUE
FALSE
When sending sensitive documents via Email, make sure that the email is either encrypted using ___________________________
Information Rights Management only
Accenture CA Root Certificates only
Either of the two
Explore all questions with a free account