Page 1 of 2
TEST RESULTS OF Kiran Kandukuri
Course
IP 2.7 Procedure for Acceptable usage Infrastructure resources V11.0
Name -
Question Total Marks
Question Description
Number Marks Scored
Who is responsible in implementing and maintaining the procedure for Acceptable
Q1 2 2
Usage of Infrastructure resources.
What are the incidents that has to be reported to Infrastructure Manager for taking
Q2 2 2
necessary actions
Q3 What are the sites that should not to be used in Attra 2 2
Unauthorized software installed by an employee without aaproval will lead to
Q4 2 2
Disciplinary Actions
Q5 It is best to change your password every ____ days. 2 2
Q6 What is the purpose of Acceptable usage of infrastructure 2 0
Conducting private business, soliciting any kind of business on behalf of family
Q7 members or friends, canvassing on behalf of a particular person/ politician / 2 2
political group/ religious organization is
Generating messages that damage, disable, or disrupt electronic messaging
Q8 2 2
services on portions or Attra entire messaging infrastructure is considered
Originating and/or distributing non-business-related materials particularly of
Q9 2 2
personal nature for personal gain is _____
Q 10 Unauthorized media and removable media (USB /Thumb drive) is 2 2
The user is responsible to ensure that software on the desktop is
Q 11 2 2
licensed/authorized
Theft or loss of company property, Malicious software and Intrusions and Virus
Q 12 2 2
should be reported to
Employees can post sensitive company information or company related comments
Q 13 2 2
on message boards, in chat rooms or anywhere else on the internet
Q 14 What kind of information should be encrypted before e-mailing 2 2
Q 15 What type of usage is considered as abuse and are strictly prohibited 2 2
Q 16 Using a common spelling is a acceptable password policy 2 2
Any violation or compromise of Information security policy should be reported as
Q 17 2 2
an incident
Sending Attra classified information to competitors, unknown recipients, and self-
Q 18 2 2
personal email-ID.
Q 19 Passwords storage in plain text on desktop/laptops/share drives (File Server) 2 2
Q 20 Password can be shared with 2 2
Q 21 Taking photographs & videos in Office premises is violation 2 2
Q 22 Attra employees sourced at client locations use Client id for communication 2 0
Q 23 Client sensitive data cannot be sent to Attra email id or personal email ID 2 0
Who is responsible in implementing and maintaining the procedure for Acceptable
Q 24 2 2
Usage of Infrastructure resources.
What are the incidents that has to be reported to Infrastructure Manager for taking
Q 25 2 2
necessary actions
Q 26 What are the sites that should not to be used in Attra 2 2
Unauthorized software installed by an employee without aaproval will lead to
Q 27 2 2
Disciplinary Actions
Q 28 It is best to change your password every ____ days. 2 2
Q 29 What is the purpose of Acceptable usage of infrastructure 2 0
Conducting private business, soliciting any kind of business on behalf of family
Q 30 members or friends, canvassing on behalf of a particular person/ politician / 2 2
political group/ religious organization is
Generating messages that damage, disable, or disrupt electronic messaging
Q 31 2 2
services on portions or Attra entire messaging infrastructure is considered
Originating and/or distributing non-business-related materials particularly of
Q 32 2 2
personal nature for personal gain is _____
https://intranet.attra.com/intranet/ws?qs=lmsmadmin&lmsmadmin=lmsmadminshow... 22-05-2019
Page 2 of 2
Q 33 Unauthorized media and removable media (USB /Thumb drive) is 2 2
The user is responsible to ensure that software on the desktop is
Q 34 2 2
licensed/authorized
Theft or loss of company property, Malicious software and Intrusions and Virus
Q 35 2 2
should be reported to
Employees can post sensitive company information or company related comments
Q 36 2 2
on message boards, in chat rooms or anywhere else on the internet
Q 37 What kind of information should be encrypted before e-mailing 2 2
Q 38 What type of usage is considered as abuse and are strictly prohibited 2 2
Q 39 Using a common spelling is a acceptable password policy 2 2
Any violation or compromise of Information security policy should be reported as
Q 40 2 2
an incident
Sending Attra classified information to competitors, unknown recipients, and self-
Q 41 2 2
personal email-ID.
Q 42 Passwords storage in plain text on desktop/laptops/share drives (File Server) 2 2
Q 43 Password can be shared with 2 2
Q 44 Taking photographs & videos in Office premises is violation 2 2
Q 45 Attra employees sourced at client locations use Client id for communication 2 0
Q 46 Client sensitive data cannot be sent to Attra email id or personal email ID 2 0
Total Marks Scored 80
Percentage scored 86 %
Close Print Test Result
https://intranet.attra.com/intranet/ws?qs=lmsmadmin&lmsmadmin=lmsmadminshow... 22-05-2019