Question Tag: Encryption

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

MI – May 2021 – L1 – SA – Q20 – Information System Development and Security

Identify the term for coding data into an unreadable form.

The coding of data into a form that is not understandable to a casual reader is called:

A. Firewall
B. Password
C. Encryption
D. Digital Signature
E. Logging

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2021 – L1 – SA – Q20 – Information System Development and Security"

BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain

Explain four measures to prevent the repetition of a hacking incident in a company’s network.

You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain

State five measures that can be put in place to prevent hacking of a company’s computer network.

Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain"

MI – May 2021 – L1 – SA – Q20 – Information System Development and Security

Identify the term for coding data into an unreadable form.

The coding of data into a form that is not understandable to a casual reader is called:

A. Firewall
B. Password
C. Encryption
D. Digital Signature
E. Logging

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2021 – L1 – SA – Q20 – Information System Development and Security"

BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain

Explain four measures to prevent the repetition of a hacking incident in a company’s network.

You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain

State five measures that can be put in place to prevent hacking of a company’s computer network.

Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain"

Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan