placeholder image to represent content

Security Questionnaire 2024

Quiz by Inpart

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
16 questions
Show answers
  • Q1

    I want to share a sensitive information with a customer, what is the adequate level of data classification?

    Question Image

    Restricted

    Internal

    Public

    Confidential

    60s
  • Q2

    How do you determine the confidentiality level of a document?

    Question Image

    Following the personal preferences of the manager

    Randomly

    Based on the content and the recipient

    All documents are public

    60s
  • Q3

    What does integrating the principle of "Privacy by Design" mean?

    Question Image

    Integrating confidentiality from the beginning of the design process

    Complying with the minimum legal confidentiality standards

    Consulting confidentiality experts only after development

    Adding privacy features only if requested by the client

    60s
  • Q4

    Why is important to consult your security team before implementing AI tools in your work environment.

    Question Image

    For continuously assessing the security risks associated with AI

    I don't need to ask security team, AI can generate the risk assessment as well

    For focusing only on AI performance

    For applying the same security standards as for other technologies

    60s
  • Q5

    What is the first action to take in the event of a data breach?

    Question Image

    Notify the security team and your manager to identify the extent of the breach and the data impacted

    Wait to see the impact of the breach before reporting

    Change all passwords without investigating the breach

    Immediately notify all clients regardless of the analysis

    60s
  • Q6

    In the event of a security breach, what is the first action to perform?

    Question Image

    Report only to higher-ups without formal documentation

    Send a general email to the entire company to warn of the problem

    Immediately report to the IT team

    Wait for a team meeting to discuss the problem

    60s
  • Q7

    What does the "Least Privilege" principle imply in access management?

    Question Image

    Granting restricted access during employee integration then obtaining higher access based on seniority

    Granting only the rights needed to perform the assigned tasks

    Allowing high access based on responsibility

    Providing administrator access to avoid frequent access restrictions

    60s
  • Q8

    What is the importance of task separation?

    Question Image

    Simplifying processes by assigning multiple tasks to a single employee

    Concentrating expertise to accelerate decision-making

    Reducing the risks of fraud and operational errors

    Increasing dependence among employees to improve collaboration

    60s
  • Q9

    '4 Eyes' Principle: When do you apply this principle?

    Question Image

    Only for financial transactions

    When two people must independently verify and approve a task or transaction

    When resources are limited and require less frequent double verification

    When tasks are too complex for one person

    60s
  • Q10

    In your opinion, how often should security documents be reviewed?

    Question Image

    Only in case of data breaches or security incidents

    According to a pre-established schedule based on a risk assessment and significant changes in the organization

    Every five years regardless of operational changes

    Once when the document is introduced without future revisions

    60s
  • Q11

    What is the importance of 'Security by Design' in software development?

    Question Image

    Focusing security on the least critical aspects of the system

    Ensuring that security is an afterthought

    Applying security only in the final phases of development

    Integrating security measures from the early phases of development

    60s
  • Q12

    How do you ensure that privacy/security is considered from the start of your development projects?

    Question Image

    Continuous monitoring of data breaches

    Periodic reviews of privacy procedures

    Consultations with lawyers specialized in personal data

    For each new project, an evaluation must be made by experts in conjunction with the security team

    60s
  • Q13

    It is mandatory to consult the security team in the selection for new tool or provider ?

    Question Image

    Yes, a risk analysis is conducted in order to prevent new vulnerability or policy compliances issues

    Yes, after the contract signature

    I don't need if the budget is approved

    No needs if it's open source

    60s
  • Q14

    When is encryption recommended ?

    Question Image

    For all internal communications

    Whenever information is transmitted or stored

    Only for confidential information

    Never, it is too costly

    60s
  • Q15

    What is the appropriate behavior to prevent tailgating, i.e. unauthorized persons trying to enter after an authorized employee?

    Question Image

    It's just a delivery man, we can leave him alone the package must be important.

    Don't let unknown people in without an access badge. Ask them who they have an appointment with and inform the office manager, without letting them in alone.

    Be polite and hold the door open for visitors.

    Make appointments with your suppliers or service providers at the office, without having to be physically present to meet them.

    60s

Teachers give this quiz to your class