0% found this document useful (0 votes)
5 views

Information Systems Policy Test

Uploaded by

0340715431768
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Information Systems Policy Test

Uploaded by

0340715431768
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Camin Cargo Control, Inc. – Systems Dept.

Information Systems Resources (ISR) Policy Questionaire

Check all that apply


Q- The most common problems we experience with computer systems are:
- Virus and malware infections
- Industrial espionage
- Privacy violation
- Lack of electricity

T/False
Q- If a virus or malware infects our company, it could really damage customer
relationship and or service quality.
- Yes
- No

T/False
Q- When using computer and the Internet at work these statements apply:
Is a privilege that may be revoked at any time
Violations may result in disciplinary action leading to termination, and/or legal action
The cost of the support in man-hours and materials to resolve a problem caused by
my violations can be deducted from my salary
- True
- False

Mark the correct answer


Q- You have a new software program and eager to see how it works; you can then:
- Install it on any company computer without asking for permission
- Load it on our company servers because these machines are faster
- Download it from the Internet during your lunch break
- Install it at your home or personal computer

T/False

1
Q- Unapproved software can cause problems such as viruses, security breaches,
consume bandwidth or cause the standard loaded software not to perform correctly
- Yes
- No

T/False
Q- You were authorized to use an Instant Messenger to contact customers, since
sending email to your friends is not allowed you use the IM to chat with your friends
over the Internet while at work.
- Sure, I can do that!
- No, the IM is only for business reasons with customers or co-workers in another
location

T/False
Q- We are not supposed to reply or forward chain email or mass mailings but to delete
these messages immediately
- True
- False

T/False

Emails can bounce, go to individuals we did not intended to or never arrive to


destination.
- Yes, it is possible and is common when using old or mistyped email addresses
- It can’t happen and I should not be concerned about it

Check all that apply


Q- You may not deliberately monopolize resources like:
- Sending mass or chain mailings or spending excessive time on the internet
- Playing local or internet games, engaging in online chats groups
- Uploading/downloading large files, use IP telephony
- Going for a walk during your break

2
Mark the correct answer
Q- I received an email from a person I know containing an attachment I don’t recognize
as being related to our business or I wasn’t expecting. Should I …
- Double Click on the attachment and see what happens?
- Save the attachment to My Documents and open it with Word or Excel?
- Forward the message to my co-workers because I think it could be funny?
- Call the sender to verify what is it and notify the IT dept to check the message
and its contents before doing further damage?

T/False
Q- Are the following statements true or false?
The exchange of inappropriate material is not tolerated and we will make every
possible effort to stop this practice.
Fraudulent, harassing, embarrassing, indecent, profane, obscene, intimidating, or
other unlawful material may not be transmitted, displayed or stored on company
systems.
If you encounter or receive such material, delete it immediately, do not forward, reply
or otherwise continue the dissemination.
- True
- False

Check all that apply


Q- Indicate which items are correct
- The company has the right to monitor emails, Internet use and other material
- I should be able to use the Internet while at the office to check my stock options
- I expect my messages to be private and not read by anyone else I intended to
- Others can accidentally read my messages
- Online gaming is OK to do as long as I do it during my breaks or night shift

T/False
Q- Passwords are just another job related ‘nuisance’ and I can share them with my co-
workers as long as they don’t abuse it.

3
- Yes
- No

T/False
Q- Choose the correct answer for the following:
I can bring my personal laptop and plug it to the network at the office to install updates
faster.
My friends send me a lot of funny emails to my work email, so I resend the good ones to
everyone in my office.
I found an online chat group that is very interesting and I subscribed using my company
email.
I belong to a political organization and I help them using the Internet at work
Downloading music is easier when I install a music sharing software in my work PC.

- This is all wrong, I am not supposed to do any of these while at the office
- These actions are allowed at work

You might also like