Question Tag: Information security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

BSIM – APR 2023 – L3 – Q5 – Information Security Objectives and Controls

Describe three main information security objectives, reasons for controls, and tools/techniques for security.

a) Describe the three main information security objectives and provide reasons why banks implement various information security controls. [10 Marks]

b) Describe various tools, techniques, and means by which organisations ensure that their Information and IT systems are secure.

[Total: 20 Marks]

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BSIM – APR 2023 – L3 – Q5 – Information Security Objectives and Controls"

RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management

Defines Cyber Security, sources of vulnerabilities, and its importance in banking.

(a) What is “Cyber Security” in the context of Information Security Management? (10 marks)

(b) What are the key sources of vulnerabilities in the Cyber Space of Banking Businesses? (5 marks)

(c) Why has Cyber Security assumed such importance in Contemporary Banking? (5 marks)

[Total: 20 marks]

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management"

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – May 2018 – L1 – SA – Q14 – Information Systems

Purpose of digital signatures in information security.

Which of the following should be addressed by a digital signature?
A. Unauthorised reading
B. Theft
C. Unauthorised copying
D. Interruption
E. Alteration

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2018 – L1 – SA – Q14 – Information Systems"

MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security

Identifying the security measure most likely to protect a database system from hackers.

Which of the following is MOST likely to protect an organisation’s database system from hackers?
A. Card-key locks
B. Virus detection
C. Encryption of data
D. Firewalls
E. Hard to determine passwords

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security"

MI – May 2023 – L1 – SB – Q5c – Information Systems

This question asks for principles of data protection under GDPR or similar frameworks.

State FOUR principles of data protection under the General Data Protection Regulation (GDPR) or a similar framework.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5c – Information Systems"

MI – May 2023 – L1 – SB – Q5b – Information Systems

This question asks for the reasons why data privacy is important.

Identify TWO reasons why data privacy is important.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5b – Information Systems"

MI – May 2023 – L1 – SB – Q5a – Information Systems

This question asks for the difference between data privacy and data protection.

Identify the difference between data privacy and data protection.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5a – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems

Identify the strategy that does not safeguard information assets.

Information assets CANNOT be safeguarded through which of the following strategies?

A. Prevention/detection of fraud
B. IT warehouse
C. Law
D. Confidentiality
E. Privacy

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems"

BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society

Understanding the primary purpose of data protection law.

The purpose of data protection law is to protect the:
A. Managers
B. Owners
C. Governments
D. Individuals
E. Investors

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society"

BSIM – APR 2023 – L3 – Q5 – Information Security Objectives and Controls

Describe three main information security objectives, reasons for controls, and tools/techniques for security.

a) Describe the three main information security objectives and provide reasons why banks implement various information security controls. [10 Marks]

b) Describe various tools, techniques, and means by which organisations ensure that their Information and IT systems are secure.

[Total: 20 Marks]

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BSIM – APR 2023 – L3 – Q5 – Information Security Objectives and Controls"

RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management

Defines Cyber Security, sources of vulnerabilities, and its importance in banking.

(a) What is “Cyber Security” in the context of Information Security Management? (10 marks)

(b) What are the key sources of vulnerabilities in the Cyber Space of Banking Businesses? (5 marks)

(c) Why has Cyber Security assumed such importance in Contemporary Banking? (5 marks)

[Total: 20 marks]

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management"

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – May 2018 – L1 – SA – Q14 – Information Systems

Purpose of digital signatures in information security.

Which of the following should be addressed by a digital signature?
A. Unauthorised reading
B. Theft
C. Unauthorised copying
D. Interruption
E. Alteration

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2018 – L1 – SA – Q14 – Information Systems"

MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security

Identifying the security measure most likely to protect a database system from hackers.

Which of the following is MOST likely to protect an organisation’s database system from hackers?
A. Card-key locks
B. Virus detection
C. Encryption of data
D. Firewalls
E. Hard to determine passwords

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security"

MI – May 2023 – L1 – SB – Q5c – Information Systems

This question asks for principles of data protection under GDPR or similar frameworks.

State FOUR principles of data protection under the General Data Protection Regulation (GDPR) or a similar framework.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5c – Information Systems"

MI – May 2023 – L1 – SB – Q5b – Information Systems

This question asks for the reasons why data privacy is important.

Identify TWO reasons why data privacy is important.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5b – Information Systems"

MI – May 2023 – L1 – SB – Q5a – Information Systems

This question asks for the difference between data privacy and data protection.

Identify the difference between data privacy and data protection.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5a – Information Systems"

MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems

Identify the strategy that does not safeguard information assets.

Information assets CANNOT be safeguarded through which of the following strategies?

A. Prevention/detection of fraud
B. IT warehouse
C. Law
D. Confidentiality
E. Privacy

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q15 – Information Systems"

BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society

Understanding the primary purpose of data protection law.

The purpose of data protection law is to protect the:
A. Managers
B. Owners
C. Governments
D. Individuals
E. Investors

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMF – May 2024 – L1 – SA – Q5 – The Role of Professional Accountants in Business and Society"

Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan