Question Tag: IT Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security

This question tests knowledge on system vulnerability, specifically referring to risks and threats.

The exposure of a system to likely risks and threats is called:
A. Virus attack
B. Worms attack
C. Vulnerability
D. Weakness
E. Data Didling

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security"

MI – Nov 2022 – L1 – SB – Q5a – Information System Development and Security

Identification of security risks and the business impacts of security violations

For an organisation dealing with confidential and commercial information, security and control over its systems is very critical.
You are required to:
i. Enumerate SIX examples of such security risks. (6 Marks)
ii. State FOUR likely business impacts of security violations. (4 Marks)
iii. List FIVE ways/methods through which security risks can be managed. (5 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2022 – L1 – SB – Q5a – Information System Development and Security"

MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security

This question tests knowledge on system vulnerability, specifically referring to risks and threats.

The exposure of a system to likely risks and threats is called:
A. Virus attack
B. Worms attack
C. Vulnerability
D. Weakness
E. Data Didling

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security"

MI – Nov 2022 – L1 – SB – Q5a – Information System Development and Security

Identification of security risks and the business impacts of security violations

For an organisation dealing with confidential and commercial information, security and control over its systems is very critical.
You are required to:
i. Enumerate SIX examples of such security risks. (6 Marks)
ii. State FOUR likely business impacts of security violations. (4 Marks)
iii. List FIVE ways/methods through which security risks can be managed. (5 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2022 – L1 – SB – Q5a – Information System Development and Security"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan