Question Tag: Information security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – May 2018 – L1 – SA – Q14 – Information Systems

Purpose of digital signatures in information security.

Which of the following should be addressed by a digital signature?
A. Unauthorised reading
B. Theft
C. Unauthorised copying
D. Interruption
E. Alteration

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2018 – L1 – SA – Q14 – Information Systems"

MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security

Identifying the security measure most likely to protect a database system from hackers.

Which of the following is MOST likely to protect an organisation’s database system from hackers?
A. Card-key locks
B. Virus detection
C. Encryption of data
D. Firewalls
E. Hard to determine passwords

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security"

MI – May 2023 – L1 – SB – Q5c – Information Systems

This question asks for principles of data protection under GDPR or similar frameworks.

State FOUR principles of data protection under the General Data Protection Regulation (GDPR) or a similar framework.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5c – Information Systems"

MI – May 2023 – L1 – SB – Q5b – Information Systems

This question asks for the reasons why data privacy is important.

Identify TWO reasons why data privacy is important.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5b – Information Systems"

MI – May 2023 – L1 – SB – Q5a – Information Systems

This question asks for the difference between data privacy and data protection.

Identify the difference between data privacy and data protection.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5a – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems

Identify the strategy that does not safeguard information assets.

Information assets CANNOT be safeguarded through which of the following strategies?

A. Prevention/detection of fraud
B. IT warehouse
C. Law
D. Confidentiality
E. Privacy

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems"

BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society

Understanding the primary purpose of data protection law.

The purpose of data protection law is to protect the:
A. Managers
B. Owners
C. Governments
D. Individuals
E. Investors

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society"

BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain five controls that an organization can adopt to provide security for its computer systems and stored data.

Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.

Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – May 2018 – L1 – SA – Q14 – Information Systems

Purpose of digital signatures in information security.

Which of the following should be addressed by a digital signature?
A. Unauthorised reading
B. Theft
C. Unauthorised copying
D. Interruption
E. Alteration

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2018 – L1 – SA – Q14 – Information Systems"

MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security

Identifying the security measure most likely to protect a database system from hackers.

Which of the following is MOST likely to protect an organisation’s database system from hackers?
A. Card-key locks
B. Virus detection
C. Encryption of data
D. Firewalls
E. Hard to determine passwords

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security"

MI – May 2023 – L1 – SB – Q5c – Information Systems

This question asks for principles of data protection under GDPR or similar frameworks.

State FOUR principles of data protection under the General Data Protection Regulation (GDPR) or a similar framework.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5c – Information Systems"

MI – May 2023 – L1 – SB – Q5b – Information Systems

This question asks for the reasons why data privacy is important.

Identify TWO reasons why data privacy is important.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5b – Information Systems"

MI – May 2023 – L1 – SB – Q5a – Information Systems

This question asks for the difference between data privacy and data protection.

Identify the difference between data privacy and data protection.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5a – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems

Identify the strategy that does not safeguard information assets.

Information assets CANNOT be safeguarded through which of the following strategies?

A. Prevention/detection of fraud
B. IT warehouse
C. Law
D. Confidentiality
E. Privacy

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems"

BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society

Understanding the primary purpose of data protection law.

The purpose of data protection law is to protect the:
A. Managers
B. Owners
C. Governments
D. Individuals
E. Investors

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society"

BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain five controls that an organization can adopt to provide security for its computer systems and stored data.

Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.

Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan