SaQ

COMPUTER SECURITY

1. Your colleague - report to isg

2. Passwords - InFy4Evr$

3. Client audit - politely decline

4. Infosys policies - no

5. You need - you will inform your manager

6. You accidently - you promptly

7. You come across - no, since

8. Ms azure - use aip ‘confidential’

9. Call from unknown - vishing

10. Right to monitor - yes

11. Information security - all the above

12. Match : worm - self replicating Virus - needs user to launch 


SECURE USAGE OF INTERNET AND EMAIL

1. Piece of code - no, client code

2. Online personal - personal maildid nd unique password

3. Under which circumstances - not under

4. Infosys finance - notify information security

5. While browsing - Exit from site notify CCD

6. Critical development - you seek hlp of ur manager

7. Medium - Raising AHD

8. Weekend - confidential 


INFOSYS POLICIES AND PROCEDURES

1. Match : Source Code - highly confidential User Passwords - highly confidential

2. Information security - option c nd d

3. Appropriate sequence - Classification Labeling Handling Disposal

4. Project closed - check with ur manager

5. You find - shred

6. Responsible - every individual 


SECURITY WITHIN PREMISES AND OUTSIDE

1. Security risk - they may carry

2. Other infoys office - no I cannot

3. Travelling - Explain

4. ODC - get an

5. Hosting Conference - a nd c

6. Not security - b nd d


BUSINESS CONTINUITY MANAGEMENT

1. Pandemic - Follow guidelines

2. Emergency disaster - you will politely

3. Suspicious - be vigilant

4. Ready for office - you call reception

5. Mobile number - telephone directory

6. Head - coo


INTELLECTUAL PROPERTY RIGHTS

1. Automation tool - yes provided

2. Incorporate open - yes provided

3. Who owns ip - employer

4. Commercial offering - a nd b

5. Found a bug - no decompilation

6. Delivery manager - approach ip team


PRIVACY AND DATA PROTECTION

1. Acceptable data - retaining employee

2. Protect personal info - both a nd b

3. Intranet side - none of above

4. Each infoscion - all the above

5. Performance assessment - it is someone else

6. Regarding privacy - Privacy is about providing

7. PII - PII collected

8. Non infoscion - since the contact no

9. Blood group - blood group sensitive should not disclosed

10. Personal Info - name

11. Server path - do not access


ANTI BRIBERY AND ANTI CORRUPTION MODULE 1

1. All options correct

2. My wife - yes as long as

3. All options correct

4. My client stockholm - dinner expense

5. My client - Mementos are covered

6. My customer - I will upload cv

7. Come to my notice - I will immediately raise

8. All statements correct


PEOPLE SECURITY AND ASHI AWARNESS

1. IC - ic is set up

2. GRB - false

3. Mr. B - no this wont be construed

4. True

5. Ms. X nd Mr. Y - company has zero tolerance

6. Sexual harassment - by writing to GRB

7. True

8. True

9. All the above

10. All the above


CONFLICT OF INTEREST AND CODE CERTIFICATION

1. All the above

2. All the above

3. No the nature

4. No your relationship

5. Yes if option 1 & 2


CONFLICT OF INTEREST DISCLOSURE

OUTSIDE - NO

INTELLECTUAL - NO

FINANCIAL - NO

DECLARATION - NO NO

DO YOU WISH - NO