
iSecurity Quiz Answers MCQ 2025 - Course Id - 7408 | TCS iEvolve MCQ | Part 1
Part 2
Part 3
Question 1: What are the different information classification categories available in the company?
A. Confidential. Secret. Public. Internal
B. Public, Internal, Private, Secret, Confidential
C. Restricted. Confidential, Internal Use Public-Private and Confidential
D. Personal, Confidential, Top Secret
Answer: C
Question 2: It is always acceptable to send business information from your customer-provided email ID to your email ID. Is this statement True or False?
A. TRUE
B. FALSE
Answer: B
Question 3: You are using the same password for an application for a long time. Is the use of the same password for a long time advisable?
A. No as use of the same password makes it vulnerable to breach over a period of time
B. Yes, as the system has not prompted for the change of password
C. Yes. as the password is shared with colleagues onsite and cannot be changed
D. No, as the current password is complex enough
Answer: A
Question 4: You are working overseas at a client location and need to use the data when you return to your home country. How will you ensure data availability?
A. Copy the data to a personal laptop
B. Upload the data on the internet
C. Copy the data on a personal USB drive and carry it with you
D. Carry the data with you with client permission
Answer: D
Question 5: You have prepared a Design Document for the new product being launched by your customer. The customer has not provided any guidance on how such documents should be classified. How will you handle the document?
A. At par with Confidential classification
B. Company Restricted
C. Since the customer has not specified any requirements, you need not classify the document.
D. Company Internal
Answer: A
Question 6: You are executing a project, and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
A. Just keep the backup of information as the customer would be aware of the regulatory requirement
B. Communicate to the customer that information has to be retained beyond the project duration with reason.
C. No need to communicate to the customer as it is a regulatory requirement
Answer: B
Question 7: When you have to retain the information, which factors should be considered for the retention period?
A. TC Retention policy
B. Regulatory requirements
C. Project duration
D. Contractual requirements
Answer: All of the above
Question 8: Which of the following statements is/are correct while using the Internet/intranet/Network Channels provided by the company?
A. Associate can produce web pages or sites that reference Company or its affiliates, or in any way disclose any other information about a company without the permission of Security Manager
B. Associate cannot use Internet-based applications including chat rooms, instant messaging, peer-to-peer network-based applications, VoIP applications without prior authorization
C. Associate can host personal sites on company facilities only after taking ISM approval.
D. Not entering into binding contracts (accepting license agreements by clicking OK/Accept while downloading any software from the internet) on behalf of the company over the internet, unless by the company legal team and authorized by
management.
Answer: B and C
Question 9: Writing down passwords is wrong. With respect to this statement, which of the following options is appropriate?
A. Remembering multiple passwords is difficult hence it is okay to write them down.
B. Writing down passwords in a notebook inside the OD is fine, as it will not cause any harm as outsiders have no entry to the ODC.
C. Writing down passwords is okay if it is shared and colleagues need to know it.
D. Writing down passwords will disclose it to unauthorized people who can misuse them, but you will be held responsible for all activities.
Answer: D
Question 10: What is referred to as social engineering?
A. Wasting resources
B. Gathering information from discarded manuals and printouts
C. Using people skills to obtain proprietary/confidential information
D. Destruction or alteration of the data
Answer: C
Question 11: If you find a person whom you know tailgating, what should you do?
A. Confront the concerned person and ask him the reason for tailgating
B. Ignore it since you know that he has no mal intentions.
C. Log a security incident.
D. Inform the security guard.
Answer: A and C
Question 12: What should you do to make your password difficult to guess or crack?
A. Do not disclose it to anyone.
B. Use a combination of alphabet, number, and special character.
C. Use a combination of residential details like the street name and flat number, etc.
D. Increase the length of the password to the extent possible.
Answer: A and B
Question 13: One day when you log on to your e-mail, you find that there is an unsolicited e-mail having abusive and offensive content in your inbox. What should you do?
A. Forward such e-mails to your colleagues
B. Report an incident along with the evidence (Header information and copy of e-mail) and then delete such e-mails from your mailbox.
C. Save such e-mails for future use.
D. Do nothing.
Answer: B
Question 14: Rakesh has been deputed to a client located in the US. The client has provided a laptop to Rakesh. His family resides in India. Every evening he uses the client-provided laptop to chat with his family through a webcam using software he has installed directly from the internet. Which of the following is correct?
A. Rakesh can use the client-provided laptop to connect with his family as he is away from them. This is acceptable since neither has he any mal intention nor is he sharing any confidential data
B. Rakesh has the right to directly download software for such use since it is a client-provided laptop
C. The client-provided laptop must be used for business purposes only.
D. Since Rakesh does not have his own laptop, he can use the client-provided laptop for such a purpose
Answer: C
Question 15: You were creating some design/flow diagrams on paper for a sensitive project of a client. when suddenly the PL calls you for an urgent meeting in a meeting room which is outside the Offshore Development Center (ODC). What is the appropriate way to handle the papers?
A. While entering the meeting room, you realize that you are carving the papers and you see your friend from another account passing by, so you send the papers with him to be handed over to someone in your ODC.
B. Put all paper inside your desk drawers. Lock it and then go for a meeting.
C. Leave the papers on the desk since it is a restricted access ODC
D. None of the above
Answer: B
Question 16: You are working on a project and require logging on to the environment managed by the client. The client has provided you with a single user ID and your entire team uses the same ID to login to the environment. Which of these statements is correct in this context?
A. It is not wrong to share credentials since the team has to complete the delivery according to the schedule
B. The team should present the scenario to the customer and request more IDs. In case the customer declines, connect with your ISM and inform the client before sharing credentials
C. Credentials should never be shared. You should consult our OU loM in such scenarios
D. It is not wrong to share credentials since this has been shared within the team
Answer: C
Question 17: You have backed up your project information on media. The project will continue for the next two years. How often should the restorability test be done?
A. Should be done only once in the lifetime of the media
B. Should be done immediately after the backup and it is a one-time activity only
C. Should be done regularly
D. Depends on client requirements according to the contract
Answer: C
Question 18: Which of the following is not true about Information classified as Private and confidential?
A. Information is not specific to individuals.
B. Information can be in the custody of the company.
C. Information always belongs to the company.
D. Disclosure of such information is not desirable.
Answer: A and C
Question 19: You are searching the Internet for some information. After clicking a link on one page, you become suspicious that it may have triggered a virus or something which is wrong. What should be your immediate reaction?
A. Isolate the machine from the network. (Disconnect from the network)
B. Log a ticket on Global Helpdesk and wait for someone to attend. Till then continue to work.
C. Ignore the suspicion and continue to work.
D. Call up the information security manager and wait for instruction
Answer: A and D
Question 20: You are executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
A. Just keep the backup of information as a customer would be aware of the regulatory requirements.
B. Communicate to the customer that information has to be retained beyond the project duration with the reason.
C. No need to communicate to the customer as it is a regulatory requirement.
Answer: B
Question 21: Which of the following is most appropriate with regard to an organization's Business Continuity Planning (BCP) framework?
A. It is not necessary to have a BCP framework, and in the event of a crisis, instant measures can be taken as per the need of the hour.
B. An organization should implement a BCP framework without doing a cost-benefit analysis.
C. The organization should carry out a cost-benefit analysis with due diligence and then implement a BCP framework that meets the business objectives of all concerned.
D. None of the above
Answer: C
Question 22: The company recommended method of disposing of non-electronic information in paper form classified as Restricted, Confidential, or Private & Confidential is the same. Is this statement True or False?
A. TRUE
B. FALSE
Answer: A
Question 23: How should an employee handle classified information while traveling?
A. Leave it on the desk.
B. Carry it along in a backpack.
C. Store it in a secure bag or locked compartment.
D. Discard it in a nearby trash can.
Answer: C
Question 24: A friend of yours shares their password with you. What should you do in this situation?
A. Use the password to access their account when needed.
B. Inform your friend about the risks of sharing passwords and advise them to change it immediately.
C. Share the password with other colleagues to ease access to your friend's account.
D. Ignore the situation and take no action.
Answer: B
Question 25: The confidentiality of information is compromised when:
A. Information is shared with authorized personnel within the organization.
B. Information is disclosed to unauthorized individuals or entities.
C. Information is stored in a secure location.
D. Information is classified as Restricted.
Answer: B
Part 2
Part 3
Post a comment
Get your FREE PDF on "100 Ways to Try ChatGPT Today"
Generating link, please wait for: 60 seconds
Comments
Karma
Tuesday, August 19, 2025 at 12:05 PM ISTI was cured from five years of Genital Herpes Virus and Itching Blisters on my genital part within 3 weeks of drinking Doctor Excel Herbal Medicine. I was recommended to Doctor excel and his website was shared by his previous clients who have been cured from herpes' I decided to try Doctor excel 'product which I placed an order for and within 3 working days I received the product on my address through DHL with instructions on how to use the medicine. I was advised to go for another Genital Herpes PCR test which I did and to my surprise my result was negative with no trace of the virus on my blood . I highly recommend him to anyone suffering from the same virus. Excelherbalcure.com
Marie
Friday, August 15, 2025 at 12:27 PM ISTI watched a podcast on the internet about a blogger who narrated her story on how she got cured from Genital herpes after drinkin a Herbal Medicine from a herbal man called dr excel, then immediately I contacted the herbal man for the same herbal medicine to help get rid of my herpes that I have got for many years, with several flare ups but all thanks to the creator for using this great herbalist to heal me from such virus just by drinking his herbal meds which he sent me to drink for more than a week...I have promised to also keep telling good things about him. feel free to share your herpes situation with him on his Website: https://excelherbalcure.com
Julieta
Tuesday, August 5, 2025 at 3:45 AM ISTIt’s unbelievable how effective herbal herb medication can be' I never thought herbal medicine could cure herpes virus until now and it wouldn’t have been possible for me to get cured without the kind support and help of doctor Excel the ancient herbal man who sent me his herbal medicine to drink and now I have just tested negative to the virus for the fourth time just to be super sure that I don't have the virus anymore. cure yourself from herpes virus with herbal meds from doctor excel through his website! https://excelherbalcure.com
Martina
Tuesday, August 5, 2025 at 3:42 AM ISTI really wanna show my gratitude to a herbal man who cured me of my herpes virus that I have been suffering from for the past 5years. few weeks ago I came across several review of people saying that they got treated and cured from Herpes Simplex Virus by a herbal man with an ancient herbal medicine' I quickly contacted the herbal man on his website and requested for the same herbal meds' he prepared and send me the meds to drink and that was how I got cured from herpes after several tests shows that I was now negative. You can also contact him for your cure via his website!!! Excelherbalcure. com
Francesca
Thursday, June 19, 2025 at 1:48 PM ISTIf you’ve fallen victim to a scam, the first crucial step is to gather all transaction details, including wallet addresses, transaction IDs, screenshots, and any communication with the scammers. This documentation will serve as key evidence in your efforts to recover the stolen assets. Once you’ve compiled your information, seeking professional help becomes essential, but you must proceed with extreme caution. Many fraudulent services claim they can recover lost funds, only to scam victims a second time. That’s why I strongly recommend reaching out to a trusted and proven recovery service like ABLE RECOVERY SERVICES. ablerecoveryservices @ proton.me
Homer
Tuesday, May 7, 2024 at 8:31 PM ISTWhich of the following statements is/are correct while using the Internet/intranet/Network Channels provided by the company? A. Associate can produce web pages or sites that reference Company or its affiliates, or in any way disclose any other information about a company without the permission of Security Manager Ans: B and D.
Lucky Sharma
Thursday, January 25, 2024 at 9:26 AM ISTGood
Rahul
Thursday, January 18, 2024 at 6:37 PM ISTQuestion no. 8
Rahul
Thursday, January 18, 2024 at 6:37 PM ISTAnswer galat h.. ek question ka