Question Tag: Cybersecurity

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

PM – Nov 2016 – L2 – Q7 – Risk Management

This question involves advising a company on how to protect its data from hackers and viruses, addressing cybersecurity threats and preventive measures.

Adak Nigeria Limited sells its products through the internet. Many people around the world have access to its website to transact various businesses. Recently, the company has been experiencing security issues with its business processes. The management has raised concerns about the following:

a. How to protect its data from hackers.
b. How to prevent its files from being destroyed by viruses.

As a Performance Management Expert, you have been consulted to provide advice on the following:
(i) How to protect the company’s data from hackers.
(ii) The types of viruses that can affect the company’s files.

Required:
Prepare a paper that addresses the concerns above.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "PM – Nov 2016 – L2 – Q7 – Risk Management"

BL – Nov 2021 – L1 – SA – Q3 – Nigerian Legal System

Identifying offences covered by the Nigerian Cybercrime Act 2015.

Which of the following offences is NOT provided for in the Nigerian Cybercrime Act 2015?
A. Hacking computer systems
B. Cyber-bullying
C. Trafficking in persons
D. Child pornography offences
E. Identity theft

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – Nov 2021 – L1 – SA – Q3 – Nigerian Legal System"

MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security

Identifying the security measure most likely to protect a database system from hackers.

Which of the following is MOST likely to protect an organisation’s database system from hackers?
A. Card-key locks
B. Virus detection
C. Encryption of data
D. Firewalls
E. Hard to determine passwords

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security"

MI – May 2023 – L1 – SB – Q5d – Information Systems

This question asks for an explanation of the differences between threat, vulnerability, and risk in information security.

Explain the differences amongst threatvulnerability, and risk.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5d – Information Systems"

BL – May 2017 – L1 – SA – Q10 – Business Ethics and Corporate Governance

Identifying a method to authenticate an email message.

A statement in an e-mail message could be authenticated by
A. Comparing the e-mail message with other self-authenticating e-mail messages
B. The testimony of a related witness
C. Some common features of the accepted e-mail message
D. The oral evidence of a computer operator
E. Franking processes

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – May 2017 – L1 – SA – Q10 – Business Ethics and Corporate Governance"

MI – Mar-Jul 2020 – L1 – SA – Q16 – Information System Development and Security

Identify the item that is not a security threat related to computer crime or abuse.

Security threats related to computer crime or abuse include the following, EXCEPT:

A. Impersonation
B. Trojan horse method
C. Logic bomb
D. Computer viruses
E. Authentication

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q16 – Information System Development and Security"

MI – May 2024 – L1 – SA – Q19 – Information Systems Development and Security

Identifies the technical term for illegal copying of software.

The act of illegal copying of a set of instructions or programs is technically described as which of the following?

A. Virus attack
B. Piracy
C. Theft
D. Crime
E. Privacy infringement

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2024 – L1 – SA – Q19 – Information Systems Development and Security"

AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence

Procedures external auditors perform to evaluate the effectiveness of data security controls.

a) Abbey Ltd is a medium-sized manufacturing company that produces various products for consumers. The company has a large amount of confidential data, including financial records, trade secrets, and personal information of employees and customers. The company has recently become concerned about cyber security risks and has hired an external auditor to conduct an audit of their data security controls.

Required:
Explain FIVE (5) procedures the External Auditor would need to perform to obtain evidence to evaluate the effectiveness of Abbey Ltd’s data security controls.

(10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence"

AA – Mar 2024 – L2 – Q4a – Institutional Regulation and Standard-Setting

Discuss significant audit issues faced by national standard-setting bodies and the IAASB.

Santom Ltd is a global company that produces and sells consumer electronics. In the past year, Santom Ltd has faced several challenges, including the COVID-19 pandemic, supply chain disruptions, and increased regulatory scrutiny. Recent global events have raised significant audit issues for external auditors.

The national standard-setting bodies and the International Auditing and Assurance Standards Board (IAASB) are currently dealing with several significant audit issues.

Required:
Discuss FIVE (5) of these significant audit issues.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Mar 2024 – L2 – Q4a – Institutional Regulation and Standard-Setting"

BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain types of cyber-attacks that might cause a company’s website to shut down.

Your company’s website has been shut down as a result of a cyber-attack.

Required:
Explain SEVEN (7) types of attacks that might have caused the shutdown. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

PM – Nov 2016 – L2 – Q7 – Risk Management

This question involves advising a company on how to protect its data from hackers and viruses, addressing cybersecurity threats and preventive measures.

Adak Nigeria Limited sells its products through the internet. Many people around the world have access to its website to transact various businesses. Recently, the company has been experiencing security issues with its business processes. The management has raised concerns about the following:

a. How to protect its data from hackers.
b. How to prevent its files from being destroyed by viruses.

As a Performance Management Expert, you have been consulted to provide advice on the following:
(i) How to protect the company’s data from hackers.
(ii) The types of viruses that can affect the company’s files.

Required:
Prepare a paper that addresses the concerns above.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "PM – Nov 2016 – L2 – Q7 – Risk Management"

BL – Nov 2021 – L1 – SA – Q3 – Nigerian Legal System

Identifying offences covered by the Nigerian Cybercrime Act 2015.

Which of the following offences is NOT provided for in the Nigerian Cybercrime Act 2015?
A. Hacking computer systems
B. Cyber-bullying
C. Trafficking in persons
D. Child pornography offences
E. Identity theft

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – Nov 2021 – L1 – SA – Q3 – Nigerian Legal System"

MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security

Identifying the security measure most likely to protect a database system from hackers.

Which of the following is MOST likely to protect an organisation’s database system from hackers?
A. Card-key locks
B. Virus detection
C. Encryption of data
D. Firewalls
E. Hard to determine passwords

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2023 – L1 – SA – Q19 – Information System Development and Security"

MI – May 2023 – L1 – SB – Q5d – Information Systems

This question asks for an explanation of the differences between threat, vulnerability, and risk in information security.

Explain the differences amongst threatvulnerability, and risk.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2023 – L1 – SB – Q5d – Information Systems"

BL – May 2017 – L1 – SA – Q10 – Business Ethics and Corporate Governance

Identifying a method to authenticate an email message.

A statement in an e-mail message could be authenticated by
A. Comparing the e-mail message with other self-authenticating e-mail messages
B. The testimony of a related witness
C. Some common features of the accepted e-mail message
D. The oral evidence of a computer operator
E. Franking processes

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – May 2017 – L1 – SA – Q10 – Business Ethics and Corporate Governance"

MI – Mar-Jul 2020 – L1 – SA – Q16 – Information System Development and Security

Identify the item that is not a security threat related to computer crime or abuse.

Security threats related to computer crime or abuse include the following, EXCEPT:

A. Impersonation
B. Trojan horse method
C. Logic bomb
D. Computer viruses
E. Authentication

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Mar-Jul 2020 – L1 – SA – Q16 – Information System Development and Security"

MI – May 2024 – L1 – SA – Q19 – Information Systems Development and Security

Identifies the technical term for illegal copying of software.

The act of illegal copying of a set of instructions or programs is technically described as which of the following?

A. Virus attack
B. Piracy
C. Theft
D. Crime
E. Privacy infringement

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2024 – L1 – SA – Q19 – Information Systems Development and Security"

AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence

Procedures external auditors perform to evaluate the effectiveness of data security controls.

a) Abbey Ltd is a medium-sized manufacturing company that produces various products for consumers. The company has a large amount of confidential data, including financial records, trade secrets, and personal information of employees and customers. The company has recently become concerned about cyber security risks and has hired an external auditor to conduct an audit of their data security controls.

Required:
Explain FIVE (5) procedures the External Auditor would need to perform to obtain evidence to evaluate the effectiveness of Abbey Ltd’s data security controls.

(10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – July 2023 – L2 – Q3a – Audit and Assurance Risk Environment, Audit and Assurance Evidence"

AA – Mar 2024 – L2 – Q4a – Institutional Regulation and Standard-Setting

Discuss significant audit issues faced by national standard-setting bodies and the IAASB.

Santom Ltd is a global company that produces and sells consumer electronics. In the past year, Santom Ltd has faced several challenges, including the COVID-19 pandemic, supply chain disruptions, and increased regulatory scrutiny. Recent global events have raised significant audit issues for external auditors.

The national standard-setting bodies and the International Auditing and Assurance Standards Board (IAASB) are currently dealing with several significant audit issues.

Required:
Discuss FIVE (5) of these significant audit issues.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Mar 2024 – L2 – Q4a – Institutional Regulation and Standard-Setting"

BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain types of cyber-attacks that might cause a company’s website to shut down.

Your company’s website has been shut down as a result of a cyber-attack.

Required:
Explain SEVEN (7) types of attacks that might have caused the shutdown. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan