Chapters 8 - IT CISI


1. How to firewalls detect and prevent cyber-crime?

  • Assesses computers, networks and apps for weaknesses.
  • control incoming and outgoing network traffic by analysing data packets and allowing / blocking them through based on the rules set.
  • By establishing which systems are most likely to be attacked and the likely consequences. Efforts concentration on those with highest risk and severity.
  • By identifying vulnerable points in the network that can easily be accessed by external and internals users.
1 of 20

Other questions in this quiz

2. What is meant by the term "fat client"?

  • A user which has no access to the internet or PC
  • A user which interacts with the system via mobile only
  • PC on which an application other than a browser is installed
  • Laptop or PC running on an internet browser only.

3. What parts of the business should the Planning Committee risk assess with regards to Disaster Recovery?

  • Highest risk areas only
  • All functional Areas
  • IT areas only
  • Critical Areas only

4. What is the last stage of the Disaster Recovery Plan ?

  • The Plan should be reviewed
  • Approval by Board Executives
  • Approval by senior managers
  • The Plan should be tested

5. What type of cyber-crime attack is one where it attempts to make a machine or network resource unavailable to its intended users? Usually by bombarding the host with very large number of requests which creates business disruption?

  • Spyware
  • DDoS
  • Botnets
  • Malware


No comments have yet been made

Similar Accounting resources:

See all Accounting resources »See all CISI IT resources »