Tag (SQ): Cybersecurity

Search 500 + past questions and counting.
Sort & Filter

Search

Filter by Professional Bodies

Filter by Subject

Filter by Topics

Filter by Levels

Identifies the security process for internet banking access.

To gain access to internet banking, a customer is required to input a password and supply a one-time code that has been sent to their mobile phone. This is an example of which of the following?

A   Two-factor authentication

B   Physical access control

C   Digital certificate

D   Enforced authorisation

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.7 – Authentication"

Defines a code that uniquely identifies a computer on the internet.

Which of the following can be defined as a code that uniquely identifies a particular computer on the internet?

A   IP address

B   Serial number

C   Server address

D   Domain name

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.5 – Internet Identification"

Defines what an Internet Protocol (IP) address is.

The definition of an Internet Protocol (IP) address is:

A   Another name for an email address

B   A code that uniquely identifies a particular computer on the Internet denoted by four sets of numbers from 0 to 999

C    A physical computer dedicated to running one or more services to serve the needs of users and other computers on a network

D   A code that uniquely identifies a particular computer on the internet denoted by four sets of numbers from 0 to 255

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.2 – Internet Protocol"

Identifies which option is not a method for keeping data secure.

Information should be easily accessible when it is needed, but it is also important to keep data secure. Which ONE of the following is NOT a method of keeping data secure?

A   WANs

B   Back-up files

C   Anti-virus software

D   Encrypted data

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.1 – IS Security"

Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan