ADA Asia Cyber Security Vendor e-Learning Assessment

Welcome to your ADA Asia Cyber Security Vendor e-Learning Assessment

According to ADA's security policy, what should a supplier report?

Which of the following is NOT a supplier's responsibility at ADA?

What action is recommended if a supplier spots a suspicious email?

What must a supplier avoid maintaining ADA's security?

If a supplier finds someone tailgating, what is the appropriate response?

Which of these should suppliers follow according to ADA's security directives?

What should be done during an evacuation drill?

Which action goes against ADA's security policy?

What is the correct procedure if a supplier notices someone stealing ADA's assets?

What does ADA require suppliers to be aware of?

When is it appropriate for a supplier to share ADA's confidential information?

What is the first thing a supplier should do if they spot an unusual activity on ADA's systems?

Which of these is NOT a part of ADA's code of conduct for suppliers?

In case of a suspected security breach, what is expected from the suppliers?

What is the protocol if a supplier finds ADA's data on an unauthorized device?

Which of the following is a recommended practice for ADA suppliers?

What action is NOT recommended when a supplier witnesses another supplier sharing their password?

As a supplier, if you are asked for ADA data by a client, you should:

Why is it important for suppliers to participate in ADA's security awareness programs?

What is the consequence of not adhering to ADA's confidentiality and integrity clauses?


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *