Q1: Does your organization have a documented information security policy?

Please select an option to continue.

Q2: How often does your organization perform risk assessments?

Please select an option to continue.

Q3: How is user access to critical systems controlled?

Please select an option to continue.

Q4: Are multi-factor authentication (MFA) mechanisms implemented?

Please select an option to continue.

Q5: Are network security controls (firewalls, IDS/IPS) implemented?

Please select an option to continue.

Test Question

Please select an option to continue.