Ulwazi (Pty) Ltd is keen to protect the company system from cyber-attacks and has therefore introduced unique
Question:
Ulwazi (Pty) Ltd is keen to protect the company system from cyber-attacks and has therefore introduced unique access codes for all employees to use when logging on to the system. What form of cyber-protection do these unique access codes represent?
A. Identification
B. Authentication
C. Authorisation
D. Certification
1.2. Which ONE of the following benefits are associated with a network configuration management (NCM) system?
A. Automatic back-up of all files containing important information.
B. Identification of any components of the IT system that have not run software updates.
C. Prevention of data modification without the consent of all the participants in the network.
D. Analysis of patterns in the data held by the system.
1.3. In response to concerns about an increase in cyber attacks, Mojalefa (Pty) Ltd has set up a security operations centre (SOC). Which ONE of the following objectives best describes the aims of a SOC?
A. To monitor an organisation's systems, defend it against breaches in security and identify and mitigate all risks.
B. To monitor Mojalefa's performance with the International Standard for Standardization (ISO) 27001.
C. To respond to cyber-security breaches and ensure business continuity during a cyber-attack.
D. To provide a fully functioning backup computer and network operations site in a disaster.
1.4. Which of the following would likely be included in an IT policy document advising on password security Policy?
1 Use the same passwords for work and personal accounts, to make it easier for you to remember them.
2 Use strong passwords that combine mixed case, alphabet, numbers, and special characters.
3 Keep a list of all your passwords either in your desk drawer or another convenient location in case you forget them.
4 The system will ensure that the last 10 passwords are not repeated.
5 Passwords should be changed at least every 30 days.
A. 1,3 and 4
B. 2, 3 and 4
C. 2, 4 and 5
D. 4 and 5
1.5. The Board of ZAR@Fin, a large financial services group, is having a strategy session. In one of the sessions, the Board developed a list of digital trends. As a follow-on from that session, they need to distinguish those trends that are driving digitalisation in their industry and those trends that are being developed as a response to those drivers. The list is: Trends
1 Users searching for insurance products like to see feedback from other customers.
2 Banks are making extensive use of Big Data and Cloud Storage.
3 Online banking products from ZAR@Fin’s rivals allow users to ‘speak’ to their banking app, using normal speech.
4 In its African market, the board notices more customers moving from rural to urban locations.
5 Customers of credit cards appear to invest time and effort in locating the 'perfect' product for them. Which of the factors identified above are trends driving the ‘digital revolution’?
A. 1, 3 and 4
B. 2, 3 and 4
C. 2, 4 and 5
D. 4 and 5
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord