Question Tag: Network Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

BMIS – May 2019 – L1 – Q6a – Introduction to information technology and information systems

Identify and explain controls for network and communication security.

In a sophisticated business environment, computer systems are exposed to security risks that threaten the security and integrity of both the system and the data held in it. The risks associated with hackers, eavesdroppers, and viruses can be minimized through a variety of controls that provide network and communication security.

Required:
Identify FIVE (5) controls that can provide network and communication security and comment on each one of them. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2019 – L1 – Q6a – Introduction to information technology and information systems"

BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain five controls that an organization can adopt to provide security for its computer systems and stored data.

Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.

Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain

Explain four measures to prevent the repetition of a hacking incident in a company’s network.

You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain

State five measures that can be put in place to prevent hacking of a company’s computer network.

Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2019 – L1 – Q6a – Introduction to information technology and information systems

Identify and explain controls for network and communication security.

In a sophisticated business environment, computer systems are exposed to security risks that threaten the security and integrity of both the system and the data held in it. The risks associated with hackers, eavesdroppers, and viruses can be minimized through a variety of controls that provide network and communication security.

Required:
Identify FIVE (5) controls that can provide network and communication security and comment on each one of them. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2019 – L1 – Q6a – Introduction to information technology and information systems"

BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain five controls that an organization can adopt to provide security for its computer systems and stored data.

Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.

Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain

Explain four measures to prevent the repetition of a hacking incident in a company’s network.

You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain

State five measures that can be put in place to prevent hacking of a company’s computer network.

Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan