Network Security and Device Management Policy
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What constitutes a violation of the email policy?

  • Emailing personal birthday invitations to team members
  • Archiving emails from a local disk
  • Forwarding business-related newsletters
  • Sending emails with obscene material (correct)
  • Which group of users can send mass emails to over 100 recipients?

  • All service accounts
  • Officers in grade H and above with approval (correct)
  • Any user regardless of grade
  • Officers in grade F and below
  • What is the storage quota for officers in grade F?

  • 750MB (correct)
  • 1GB
  • 2GB
  • 100MB
  • Who is responsible for backing up archived emails saved to local disks?

    <p>Individual users</p> Signup and view all the answers

    What type of emails should not be sent as mass mail according to the policy?

    <p>Mass emails promoting private businesses</p> Signup and view all the answers

    Which of the following is not considered inappropriate email usage?

    <p>Sending emails relevant to professional development</p> Signup and view all the answers

    What is the action that may result from inappropriate email usage?

    <p>Deactivation of the email account</p> Signup and view all the answers

    What should officers in grade G or lower do before sending mass emails?

    <p>Request approval from the head of business functions</p> Signup and view all the answers

    What is required in terms of time synchronization for network devices?

    <p>All devices must synchronize with a common source using NTP to IST.</p> Signup and view all the answers

    Which of the following actions is NOT permitted regarding LAN and WAN connectivity?

    <p>Providing leased lines without prior approval.</p> Signup and view all the answers

    What measures should be taken regarding device passwords before deployment?

    <p>Passwords must be changed as per the password policy.</p> Signup and view all the answers

    What is the requirement for remote access to the corporate network?

    <p>Access must be via secured VPN with two-factor authentication after approval.</p> Signup and view all the answers

    What must happen to unused ports and interfaces on devices?

    <p>They must be disabled.</p> Signup and view all the answers

    What is required regarding network equipment configuration backups?

    <p>Backups must occur at least once a month and after configuration changes.</p> Signup and view all the answers

    What should be done with CCTV connections to the corporate LAN?

    <p>CCTV connections must go through a security appliance if connecting to the corporate LAN.</p> Signup and view all the answers

    Which protocol is specified not to be used for remote access?

    <p>Telnet</p> Signup and view all the answers

    What is a requirement for wireless client systems according to the security policy?

    <p>They must use only corporate wireless connectivity.</p> Signup and view all the answers

    Which mechanism is used to manage access points in the corporate network?

    <p>Wireless controller.</p> Signup and view all the answers

    What type of authentication is mandated for access to wireless networks?

    <p>WPA2 with 802.1x/EAP/PEAP or latest.</p> Signup and view all the answers

    What is required for all wireless communication between clients and corporate networks?

    <p>It shall be encrypted.</p> Signup and view all the answers

    Which of the following is NOT allowed according to the wireless security policy?

    <p>Simultaneous connection between wired and wireless network on the same device.</p> Signup and view all the answers

    What must be deployed at corporate locations with permanent wireless networks?

    <p>Wireless intrusion prevention systems.</p> Signup and view all the answers

    How should access permissions for wireless clients be managed if IPS cannot be deployed?

    <p>Based on hardware/MAC address white-listing.</p> Signup and view all the answers

    What must be ensured regarding the separation of networks?

    <p>There must be a separation of wireless LAN from the wired LAN.</p> Signup and view all the answers

    What is the primary recommendation regarding updates to IT infrastructure?

    <p>Explore possible options on Cloud first.</p> Signup and view all the answers

    What factors should be assessed before adopting cloud services?

    <p>The nature of the work, data, and applications involved.</p> Signup and view all the answers

    Which of the following is NOT mentioned as a consideration in adopting cloud services?

    <p>Existing infrastructure costs.</p> Signup and view all the answers

    What is the recommended first step for new IT requirements?

    <p>Assess options available through cloud services.</p> Signup and view all the answers

    In which scenario is it advised to consider cloud services?

    <p>For a refresh of existing IT infrastructure.</p> Signup and view all the answers

    What is an essential component to evaluate when moving applications to the cloud?

    <p>The applications that will be moved.</p> Signup and view all the answers

    What should be the basis for adopting cloud services according to the given policy?

    <p>Assessment results of the specific requirements.</p> Signup and view all the answers

    Why is it important to assess data before adopting cloud services?

    <p>To understand the implications of data migration.</p> Signup and view all the answers

    What is required for any cloud service engagement according to the regulations?

    <p>Only use MeitY empaneled cloud service providers</p> Signup and view all the answers

    What must be implemented for handling sensitive personal data in the cloud?

    <p>Thorough examination and strict security controls</p> Signup and view all the answers

    What must be built into the contract for projects involving Aadhaar data?

    <p>Aadhaar related technical requirements</p> Signup and view all the answers

    What is the development architecture for IndianOil mobile applications based on?

    <p>Industry-wide open standards</p> Signup and view all the answers

    For external users, what type of connectivity is required between their devices and web servers?

    <p>SSL connectivity using public certificates</p> Signup and view all the answers

    What types of mobile applications has IndianOil adopted?

    <p>Applications for employees, dealers, and the general public</p> Signup and view all the answers

    Which of the following is NOT a key aspect of securing mobile devices for IndianOil?

    <p>Ignoring security updates</p> Signup and view all the answers

    What is a key requirement for network communication links to cloud service providers?

    <p>Approval from COIS before engagement</p> Signup and view all the answers

    Study Notes

    Network Security and Policy

    • Different network zones must be securely interconnected to maintain integrity and security.
    • Utilize web security gateways, content filtering, and firewalls for controlling external network traffic.
    • All network and infrastructure devices should implement Network Time Protocol (NTP) aligned with Indian Standard Time (IST).
    • New network and infrastructure equipment must comply with IPV6 standards.

    LAN and WAN Management

    • Approval from COIS is mandatory for leased lines, MPLS VPNs, internet lines, and P2P communication links.
    • Divisions can request bandwidth enhancements or reductions, subject to COIS's review.
    • COIS governs the IP address scheme for LAN/WAN allocations.
    • Rate contracts for WAN MPLS services must be finalized by COIS and utilized by divisions with prior approval for any extra needs.

    Device Security Protocols

    • Default settings and passwords of devices must be changed before deployment; passwords must align with policy standards.
    • Secure protocols (SSH, SSL, IPsec) should be used for remote access, while insecure protocols like telnet must be disabled.
    • All unused ports on devices need to be disabled, and devices should automatically close inactive sessions.
    • Only approved routing protocols are allowed for WAN configurations.
    • Regular (monthly) backups of device configurations are required, especially after changes.
    • CCTV networks should be isolated from corporate LAN, connecting through a security appliance as needed.

    Network Access Policies

    • Remote access must be conducted via a secure VPN with two-factor authentication, granted on approval.
    • Development, quality, and testing environments must be separated from the production environment.

    Wireless Network Security

    • Users must connect only via corporate wireless networks, avoiding external untrusted access points.
    • Wireless LAN must be segregated from wired LAN, with regular maintenance and audits conducted.
    • Wireless controllers are necessary for managing access points and limiting coverage.
    • Tips for authentication: all wireless access must be authenticated with strong password policies and WPA2 encryption or better.

    Email Usage Policy

    • Strictly prohibits derogatory, offensive, political, or personal emails through corporate accounts.
    • Sending mass emails requires authorization based on recipient count, restricted by user grade.
    • Users must back up emails regularly; the administrator does not restore lost data due to user error.

    Cloud Computing Strategy

    • Explore cloud options for updating IT infrastructure, assessing data and application needs before adoption.
    • Ensure compliance with cybersecurity and data regulation standards, specifically regarding data localization.
    • Engage only MeitY empaneled Cloud Service Providers (CSP) for any services involving sensitive data.
    • Must include strong security measures like data encryption and multi-factor authentication for projects with personal data.

    Mobile Technology Integration

    • Customized mobile applications aim to facilitate access for employees, dealers, consumers, and vendors.
    • Development should adhere to open standards for compatibility with third-party solutions.
    • Strong mobile device security must be maintained, utilizing SSL connections for external user access to corporate data.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on essential network security measures and policies related to LAN and WAN management. This quiz covers the protocols for secure connections, device security, and guidelines for effective network administration. Enhance your understanding of both infrastructure management and device configuration standards.

    More Like This

    Use Quizgecko on...
    Browser
    Browser