SaQ
COMPUTER SECURITY 1. Your colleague - report to isg 2. Passwords - InFy4Evr$ 3. Client audit - politely decline 4. Infosys policies - no 5. You need - you will inform your manager 6. You accidently - you promptly 7. You come across - no, since 8. Ms azure - use aip ‘confidential’ 9. Call from unknown - vishing 10. Right to monitor - yes 11. Information security - all the above 12. Match : worm - self replicating Virus - needs user to launch SECURE USAGE OF INTERNET AND EMAIL 1. Piece of code - no, client code 2. Online personal - personal maildid nd unique password 3. Under which circumstances - not under 4. Infosys finance - notify information security 5. While browsing - Exit from site notify CCD 6. Critical development - you seek hlp of ur manager 7. Medium - Raising AHD 8. Weekend - confidential INFOSYS POLICIES AND PROCEDURES 1. Match : Source Code - highly confidential User Passwords - highly confidential 2. Information security - option c nd d 3. Appropriate sequenc...