Professional Documents
Culture Documents
Saq 1
Saq 1
test that needs to be completed by 9th of December, 2020. To overcome the possibility
of order of questions or options being shuffled, this document contains few text phrases
that will help you in marking the right answer. Despite having some data missing, this
document will ensure that you pass the SAQ. The quiz consists of 11 sections. Each
section has to be cleared to move on to the next section. Your progress in each
section is saved after you clear it so that you can exit any time and resume from
that same section again where you left. The document as of now contains the
Answer key to the first 5 sections. Please inform in the WhatsApp group which
section you are willing to take responsibility for & clear the quiz for that same
section after studying for the same. Once you clear a section, you’ll be able to see all
the right answers for that section. Make note of all the correct answers from that section
so that it can be shared with everyone else. Once you have the Answer Key to your
section for which you studied, contact the editor of this document so that you
can be given access to edit it and help the remaining ones.
Please contribute to the answer key. Aisa kar ke tum kafi cool lagoge. Believe me!
COMPUTER SECURITY
3- Infosys has the right to monitor, investigate, erase and wipe data. . .
Ans: [A]-Yes
5-Colleague tells you about vulnerability in one of the internal applications. . . What will you do?
Ans: [D]- Report to ISG via AHD
6-Which of the following passwords meets the Infosys requirement and would be easy to
remember?. . .
Ans: [C]- InFy4Evr$
9-Emergency leave. . manager seeks credentials to avoid impact of service. . .what would be
most appropriate to do. . .?
Ans: [B] Inform manager that this will be violation. . . Alternate user ID with similar privileges. . .
10-Accidentally find appraisal information in a shared folder. . . what will you do. . . ?
Ans: [E] Notify Manager
11-Very useful and free utility tool that can be easily downloaded from the internet. . . Will you
go ahead. . .?
Ans: [C] No, Since this could lead to Downloading of Malware.
2-Working on a critical development project & facing difficulty in coding. . .what action to do. . .?
Ans: [C] Seek help of your manager who connects you to a senior developer in team
3-You want to complete a job over the weekend & you don’t have an Infosys/client laptop. What
is the best way to share. . .?
Ans: [FORGOT TO WRITE] Confidential client files must not be sent outside the client network.
4-You receive an email that appears to be from the Infosys Financial team requesting
credentials. What action to take. . .?
Ans: [C] Notify ISG by attaching suspicious mail for investigation
7-While browsing the Internet via Infosys, you accidentally come across a site which seems
malicious but is not blocked. . . What do you do. . .?
Ans: [B] Exit immediately & notify CCD & ISG through AHD
9. Under which circumstances you are permitted to download and use trial version… ?
[D] not under any circumstances…
INFOSYS POLICIES
1. Appropriate sequence...
[C] classification, labeling, handling, disposal
1. Prerequisite of bribe?
Ans: [D] All of the Above (AOTA from here)
5. Client visiting infosys bangalore DC for first time. . . What can I offer as a memento?
Ans: [C] within limit of 100USD per person
7. Ms. X & Mr. Y are peers who work in the same team. . ?
Ans: [B] Company has zero tolerance for false allegations
1. Process client data for purpose relevant for delivering the service. . . ?
Ans: [B] Obtain client permission
2. Not likely to be personally identifiable. . .?
Ans: [B] Client Provided personal Financial Information
5. Process client personal data . . . require certain approved tool. What would be
acceptable?
Ans: [A] Inform client & request.
Conflict of Interest and Code Certification