Question Tag: Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

BMIS-Nov-2024-L1-Q3c-Explanation of a “51% Attack” in Blockchain

Defines a "51% attack" in blockchain and explains its implications.

Blockchain consists of multiple ‘blocks’ of digital information which are held in a public database known as a ‘chain’. Blockchain technology offers a number of advantages. However, it is susceptible to a form of cyber-attack known as 51% attack.
Required:
Explain what is meant by “51% attack”.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS-Nov-2024-L1-Q3c-Explanation of a “51% Attack” in Blockchain"

MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security

Identify the primary purpose of a firewall in computer systems.

Firewall in a computer system is used for:

A. Security

B. Transmission

C. Encryption

D. Fire drills

E. Reporting

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security"

Question Title: BMIS – Nov 2019 – L1 – Q5a – Factors in Developing a Good Layout

Discuss the factors an organization should consider in developing a good layout

The layout of an operation or process means how resources are positioned relative to each other,
how various tasks are allocated to these resources, and the general appearance of the resources.
Together these three decisions will dictate the pattern and nature of how transformed resources
progress through the operation or process. If the layout proves wrong, it can lead to over-long
or confused flow patterns, customer queues in an organization, long process times, inflexible
operations, unpredictable flow, high costs and a poor response for whoever is within the
operation, whether they are customers or staff.

Required

Explain FOUR (4) factors an organization should consider in such a layout. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "Question Title: BMIS – Nov 2019 – L1 – Q5a – Factors in Developing a Good Layout"

MI – Nov 2021 – L1 – SB – Q6a – Information Systems

Define Virtual Private Network (VPN).

What is Virtual Private Network (VPN)? (3 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2021 – L1 – SB – Q6a – Information Systems"

BL – Nov 2022 – L1 – SA – Q5 – Company Law

Identifying the term for an equitable charge on all assets as security.

An equitable charge on all of the assets or property of a company as security for indebtedness of the company is called:

A. Assets charge
B. Property charge
C. Fixed charge
D. Multiple charge
E. Floating charge

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – Nov 2022 – L1 – SA – Q5 – Company Law"

MI – Nov 2022 – L1 – SA – Q20 – Information System

Identification of information system assessment software tools

Which of the following is an example of information system assessment software tools?
A. Information security tool
B. Microsoft security assessment tool
C. Information system security tool
D. Microsoft information security tool
E. Information assessment tool

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2022 – L1 – SA – Q20 – Information System"

BL – May 2017 – L1 – SB – Q3b – Law Relating to Banking

Examines the nature of security provided for indebtedness under insolvency law and classifies the form of security (mortgage or pledge) based on the facts provided.

Jaugernault Plc borrowed N100 million from Kokote Bank Plc and secured the payment of the loan with a property named in the loan document as the house at No 2, Coconut Avenue, Enugu. The document is expressed to be a deed, and the borrower company does not have the power to manage the house in the ordinary course of business. The house is transferred to Kokote Bank Plc subject to cessation on redemption.

Required:

i. Explain the nature of the security of the indebtedness under insolvency law. (2 Marks)

ii. From the facts, state if it amounts to a mortgage or pledge and indicate the type. (4 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – May 2017 – L1 – SB – Q3b – Law Relating to Banking"

BMIS – May 2016 – L1 – Q3b – Teams

Explain five benefits that may accrue to an individual for joining a formal group in an organization.

One of your colleagues is reluctant in joining a formal group that has been established in your company.
Explain FIVE benefits that may accrue to him/her if he/she joins the group.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q3b – Teams"

BMIS-Nov-2024-L1-Q3c-Explanation of a “51% Attack” in Blockchain

Defines a "51% attack" in blockchain and explains its implications.

Blockchain consists of multiple ‘blocks’ of digital information which are held in a public database known as a ‘chain’. Blockchain technology offers a number of advantages. However, it is susceptible to a form of cyber-attack known as 51% attack.
Required:
Explain what is meant by “51% attack”.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS-Nov-2024-L1-Q3c-Explanation of a “51% Attack” in Blockchain"

MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security

Identify the primary purpose of a firewall in computer systems.

Firewall in a computer system is used for:

A. Security

B. Transmission

C. Encryption

D. Fire drills

E. Reporting

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security"

Question Title: BMIS – Nov 2019 – L1 – Q5a – Factors in Developing a Good Layout

Discuss the factors an organization should consider in developing a good layout

The layout of an operation or process means how resources are positioned relative to each other,
how various tasks are allocated to these resources, and the general appearance of the resources.
Together these three decisions will dictate the pattern and nature of how transformed resources
progress through the operation or process. If the layout proves wrong, it can lead to over-long
or confused flow patterns, customer queues in an organization, long process times, inflexible
operations, unpredictable flow, high costs and a poor response for whoever is within the
operation, whether they are customers or staff.

Required

Explain FOUR (4) factors an organization should consider in such a layout. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "Question Title: BMIS – Nov 2019 – L1 – Q5a – Factors in Developing a Good Layout"

MI – Nov 2021 – L1 – SB – Q6a – Information Systems

Define Virtual Private Network (VPN).

What is Virtual Private Network (VPN)? (3 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2021 – L1 – SB – Q6a – Information Systems"

BL – Nov 2022 – L1 – SA – Q5 – Company Law

Identifying the term for an equitable charge on all assets as security.

An equitable charge on all of the assets or property of a company as security for indebtedness of the company is called:

A. Assets charge
B. Property charge
C. Fixed charge
D. Multiple charge
E. Floating charge

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – Nov 2022 – L1 – SA – Q5 – Company Law"

MI – Nov 2022 – L1 – SA – Q20 – Information System

Identification of information system assessment software tools

Which of the following is an example of information system assessment software tools?
A. Information security tool
B. Microsoft security assessment tool
C. Information system security tool
D. Microsoft information security tool
E. Information assessment tool

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2022 – L1 – SA – Q20 – Information System"

BL – May 2017 – L1 – SB – Q3b – Law Relating to Banking

Examines the nature of security provided for indebtedness under insolvency law and classifies the form of security (mortgage or pledge) based on the facts provided.

Jaugernault Plc borrowed N100 million from Kokote Bank Plc and secured the payment of the loan with a property named in the loan document as the house at No 2, Coconut Avenue, Enugu. The document is expressed to be a deed, and the borrower company does not have the power to manage the house in the ordinary course of business. The house is transferred to Kokote Bank Plc subject to cessation on redemption.

Required:

i. Explain the nature of the security of the indebtedness under insolvency law. (2 Marks)

ii. From the facts, state if it amounts to a mortgage or pledge and indicate the type. (4 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BL – May 2017 – L1 – SB – Q3b – Law Relating to Banking"

BMIS – May 2016 – L1 – Q3b – Teams

Explain five benefits that may accrue to an individual for joining a formal group in an organization.

One of your colleagues is reluctant in joining a formal group that has been established in your company.
Explain FIVE benefits that may accrue to him/her if he/she joins the group.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q3b – Teams"

NBC Institute

Hello! How can I help you today?
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan