This quiz has expired. Click here to see the results.

DSR Certification Program: Training Module 1

by: GeorgetownUISO | Skip to Results Private

This quiz is part of a series of quizzes to test the effectiveness the Georgetown University Data Security Representative (DSR) Certification program.

Please review each question and select the appropriate answer. Feel free to use your training materials to identify the correct answers. The results from your quiz will be reviewed by the DSR program coordinator.

Questions and comments may sent to Nicole Kegler at nk278@georgetown.edu or 202-687-5784.

  1. 1

    What are the pillars of information security?

  2. 2

    What is the term that means a vulnerability, and the likelihood of that vulnerability being used?

  3. 3

    Which of the following questions relates best to the term Identification?

  4. 4

    Information security is a journey. What is it not?

  5. 5

    What does information security start with?

  6. 6

    What does the Information Security Policy say about accessing confidential information?

  7. 7

    According to the Interim Policy on the Use, Collection and Retention of SSNs at Georgetown University, can a SSN be used as an identifier?

  8. 8

    Controls, or safeguards, can serve what function?

  9. 9

    How do you manage risk?

  10. 10

    What is an example of an incident response handled by the UISO?

  11. 11

    Which of the following federal laws and regulations deal with student records?

  12. 12

    What is the greatest impact to the university following a data breach?

Created by GeorgetownUISO

gusecurity's avatar
GeorgetownUISO
47, Female
Washington, DC, US

Categories

© 2017 Polarity Technologies
X
X

Invite Next Author

Write a short message (optional)

or via Email

Enter Quibblo Username

X

Report This Content