The Head of IT Security has been asked to conduct a detailed forensic analysis of a suspected data breach that ted to customer credit card details being intercepted.
Which TWO of the following would be suitable objectives for such a forensic analysis?
Answer : B, C
JKL is a retailer with more than 45 shops around the country. The directors suspect that a serious fraud has occurred at one of the branches and a team of internal auditors has been sent to investigate
An analytical review investigation shows that sales revenue is in line with budget, but overtime payments to shop staff exceed budget by 20%.
How should the internal audit team proceed?
Answer : B
Company directors who exercise executive share options generally resell the shares immediately, rather than holding them Which of the following best explains this behavior?
Answer : A
YY is a company which generates electricity from alternative energy sources It has just begun constructing a wind farm near a well-known beauty spot The protect has been controversial as campaigners say it will be noisy and unsightly.
The campaigners took legal action but lost the case Some of them have started a campaign of direct action against YY and are physically blocking roads leading to the site and attempting to intimidate YY's staff
YY has hired a security company to help it to protect its staff
Which of the following statements are view in relation to the ethics of this scenario''
Select ALL that apply.
Answer : A, B, D
WTW is a global company which produces high-tech equipment such as smart televisions and mobile phones The CFO has just resigned, having been offered a post at a competitor The CFO was well regarded and WTWs share price has fallen in response to the announcement
At a board meeting the production director commented that the share price fall is the fault of the nomination committee
Which THREE of the following statements are correct?
Answer : A, C, D
CDE an online ticket sales agent, has unwittingly become an accomplice in cyber crime and is suffering attacks on its own business as a result CDE's website was poorly designed and cyber-attackers have managed to inject the site with malware, so that it collects all of CDE's customer log-in information and enables the cyber-attackers to retrieve it
The cyber-attackers subsequently use this information to set up Botnet agents in the customers' devices which are then used in a Distributed Denial of Service (DDoS) attack whenever very popular tickets are being placed on sale such as international football matches
The cyber-attackers secure access to a single portal on the site and buy multiple tickets for subsequent sale on the black market while the DDoS causes all other portals to be overloaded preventing real fans acquiring the tickets at face value
Which TWO of the following apply in this scenario?
Answer : A, D
T has its computer facilities in a building adjacent to its headquarters Severe structural problems have been discovered with this building and T has been advised that the only option is demolition and rebuild This leaves T with strategic decisions to make about its IT provision and it has decided to investigate the outsourcing of its services
Which TWO of the following factors should T consider as most important at this stage?
Answer : D, E