No student devices needed. Know more
10 questions
Select 2 (two) examples of strong password security control
Configurable password length, minimum 8 characters
Enforce password history. It should not be possible to re-use last 5 passwords
Configurable password age, maximum of 120 days
Password must appear in any audit trail or logs
What are the 2 main topics that we covered under ITGC Awareness #1 - Access Control Best Practices?
System Access Control & Hardware Access Control
System Access Control & Physical Access Control
Hardware Access Control & Physical Access Control
Password Controls & Equipment Security
Requirement gathering & analysis is the first activity in SDLC where Business and IT stakeholders provide functional and technical requirements which are agreed and signed off.
Which of the following details the correct flow for Requirement Gathering & Analysis process?
Develop Requirements > Document Requirements > Review Requirements > Manage Requirements
Document Requirements > Manage Requirements > Develop Requirements > Review Requirements
Manage Requirements > Document Requirements > Review Requirements > Develop Requirements
Develop Requirements > Review Requirements > Document Requirements > Manage Requirements
Select 3 (three) types of testing that MUST be conducted and signed off
System Test
Manual Test
System Integration Test (SIT)
User Acceptance Test (UAT)
Data Centre Operations consist of (select all that is applicable)
Batch Job Run & Monitoring
System Administration
Patch Management
Tape Management
You are not allowed to bring bags or wear sandals and short pants when entering Data Centre or Server Room.
Is this statement is correct?
No, its not
No, you are allowed to bring bags but no sandals and short pants
Absolutely Yes!
Yes, but you can wear sandals when no one is there
How often does the IT DR plan need to be updated?
At least once a year
Every 2 years
3 times a year
Every 5 years
A ITDR test is the process of running through each step of the disaster recovery plan to ensure that it can be implemented in emergency situations and that all involved understand how it is to be executed.
Is this statement is correct?
Yes
No
What do you need to do before you can bring your own device (BYOD) and use it for office / work purposes?
A) Obtain the necessary approvals
B) Register the device(s)
C) Get IT Security to analyze the device(s) for security risks
D) Have IT Security to configure the device(s) with mandatory applications and security settings
A only
A and B
A, B, and D
All of the above
Which if the following is NOT part of Endpoint Security?
All endpoints must be installed with the latest antivirus / anti-malware and Endpoint Detection and Response (EDR) software and signatures
Lock your screen when you are away from your computer
Update all the server's backup tape movement into Master Inventory
Report immediately to the appropriate authorities and Reporting Manager if a CIMB laptop / PC is stolen or lost
Explore all questions with a free account