0 of 14 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Time has elapsed
Your answers have now been transferred to your Mentor who will assess and get back to you with feedback.
1) What is the definition of personally identifiable information?
This response will be reviewed and graded after submission.
2) List 3 examples of personally identifiable information.
This response will be reviewed and graded after submission.
3) What legislation governs how personally identifiable information is collected, used, stored and disclosed in Australia
This response will be reviewed and graded after submission.
4) How do organisational policies and procedures contribute to an organisation’s cybersecurity position?
This response will be reviewed and graded after submission.
5) Consider your own role and the organisation that you work for. What sensitive information do you or your organisation handle?
This response will be reviewed and graded after submission.
6) How does the organisation that you work for store customer data?
This response will be reviewed and graded after submission.
7) In your role, describe the process for correcting data that is inaccurate or out of date.
This response will be reviewed and graded after submission.
8) List and describe the 3 broad categories of workplace information?
This response will be reviewed and graded after submission.
9) What is the difference between authentication and authorisation?
This response will be reviewed and graded after submission.
10) In the event of a cyber-attack what is the benefit of having a system backup?
This response will be reviewed and graded after submission.
11) What is the purpose of a Privacy Impact Assessment?
This response will be reviewed and graded after submission.
12) What are the benefits of consulting with stakeholders when completing a Privacy Impact Assessment?
This response will be reviewed and graded after submission.
13) What is your work place process for reporting malfunctioning infrastructure?
This response will be reviewed and graded after submission.
14) How can adherence to data protection compliance standards be monitored?
This response will be reviewed and graded after submission.