100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary AIN1501 Assessment 6 semester 2 2024

Rating
-
Sold
1
Pages
6
Uploaded on
18-10-2024
Written in
2024/2025

AIN1501 Assessment 6 semester 2 2024

Institution
Module









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Module

Document information

Uploaded on
October 18, 2024
Number of pages
6
Written in
2024/2025
Type
Summary

Subjects

Content preview

Assessment 6 semester 2 2024

AIN1501

Here is a summary of all the questions and answers in a question-and-answer format:



1. **As cyber risks of cloud and mobile computing, providing business and customer data to an
outsourced service provider, unauthorized access of business and customer data means that
the data can be accessed by that service provider’s staff.**

- **Answer:** a. TRUE.



2. **Hacking is the gaining of unauthorized access to a computer system.**

- **Answer:** a. TRUE.



3. **Information quality as the condition of lawful processing of information means personal
information collected and stored must be…**

- **Answer:** d. Up to date and not misleading.



4. **Technical support and training policies as part of general controls ensure that all the users
of the organization’s IT systems are competent.**

- **Answer:** a. TRUE.



5. **Antivirus software is a software used to prevent virus infections on computers and
computer networks.**

- **Answer:** a. TRUE.



6. **As one of the fundamental principles of ethics that an individual professional accountant is
required to comply with, integrity means being…**

- **Answer:** a. Straightforward in all key professional and business relationships.



7. **As one of the fundamental principles of ethics that an individual professional accountant is
required to comply with, professional behavior requires the following…**

, - **Answer:** d. A and B.



8. **Computer-related scams are a subsection of computer fraud and usually offer too-good-to-
be-true deals.**

- **Answer:** a. TRUE.



9. **Identity theft is used to obtain goods and services fraudulently.**

- **Answer:** a. TRUE.



10. **Unauthorized access, usage, damage, or theft presents a potential threat to privacy and
security data.**

- **Answer:** a. TRUE.



11. **The Protection of Personal Information Act (POPIA or the Act), No. 4 of 2013 came into
effect on…**

- **Answer:** b. 1 July 2021.



12. **The location of back-up facilities is also an important issue.**

- **Answer:** a. TRUE.



13. **Human errors which are unintentional errors from using Information System (IS) present a
threat to privacy and security of data.**

- **Answer:** a. TRUE.



14. **Vulnerabilities can be classified as either practical, procedural, or physical.**

- **Answer:** a. TRUE.



15. **Passwords should include numbers, capital letters, and special characters and should not
be a word related to your everyday life.**

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Barewolf University of South Africa (Unisa)
Follow You need to be logged in order to follow users or courses
Sold
26
Member since
3 year
Number of followers
7
Documents
18
Last sold
4 months ago

3.0

4 reviews

5
1
4
0
3
1
2
2
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions