• Home
  • About Us
    • Our Vision & Mission
    • Why Imas
      • How to Start IMAS
      • Open Days
    • IMAS Accredations
    • Board of Directors
    • Testimonial
  • CIMA
    • CGMA-Finance-Leadership-Program-FLP
    • CIMA Professional Accountancy
    • Why CIMA
      • CIMA Study Option
    • CIMA Study Routes
      • CIMA Gateway Routes
      • CIMA GLOBAL CA PROGRAMME
      • Cima certification in business Accounting
      • CIMA Professional Qualification
    • CIMA Part Time Classes
  • ACCA
    • ACCA Accelerate Programme
    • Acca Campus
      • ACCA Johannesburg
    • How to start ACCA
    • Why ACCA
      • Acca Study Options
    • Foundation in Accountancy
  • ICB
    • Icb Registration 2025
    • Open Day
    • ICB Qualifications
    • Financial Accounting
    • Office Administration
  • Contact Us
  • Short Courses
  • Blogs
  • Open Days
  • Login
Apply now

P3 Chapter 10 Quiz

by imasnew | May 20, 2025

Time limit: 0

Quiz Summary

0 of 15 Questions completed

Questions:

Information

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading…

You must sign in or sign up to start the quiz.

You must first complete the following:

Results

Quiz complete. Results are being recorded.

Results

0 of 15 Questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 point(s), (0)

Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)

Categories

  1. Not categorized 0%
Would you like to submit your quiz result to the leaderboard?
Loading
captcha
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  1. Current
  2. Review
  3. Answered
  4. Correct
  5. Incorrect
  1. Question 1 of 15
    1. Question

    Lily is the location manager of AK, a clothing line operating nationwide. AK recently suffered a cyber security breach, the extent and damage of which still remains unclear. All the managers of AK have agreed that an investigation should be carried out as to find out the extent of the breach and the person responsible for it. The management of AK plans to take the culprit to court and hence requires this investigation to collect sufficient evidence for prosecution.

    Lily has previously experienced such breaches and knows that the breach and its investigation can be on three different levels. She has prepared a question to put to the investigator regarding all three levels.

    “Question number 3: Has the threat affected data stored by the organization?”

    Question number 3 relates to which level of the investigation?

    Correct
    Incorrect
  2. Question 2 of 15
    2. Question

    Which of the following types of penetration testing is carried out from the user’s point of view?

    Correct
    Incorrect
  3. Question 3 of 15
    3. Question

    The application of science or technology to investigate crime, including the cause and consequences, is called:

    Correct
    Incorrect
  4. Question 4 of 15
    4. Question

    Lily is the location manager of AK, a clothing line operating nationwide. AK recently suffered a cyber security breach, the extent and damage of which still remains unclear. All the managers of AK have agreed that an investigation should be carried out as to find out the extent of the breach and the person responsible for it. The management of AK plans to take the culprit to court and hence requires this investigation to collect sufficient evidence for prosecution.

    Lily has previously experienced such breaches and knows that the breach and its investigation can be on three different levels. She has prepared a question to put to the investigator regarding all three levels.

    “Question number 1: Has the threat affected the entire system or just certain parts of it?”

    The above question relates to which level of the investigation?

    Correct
    Incorrect
  5. Question 5 of 15
    5. Question

    Which of the following correctly defines IPSEC?

    Correct
    Incorrect
  6. Question 6 of 15
    6. Question

    Frampton Ltd is an electronics company, the firm specialises in producing smartphones.

    Frampton’s largest competitor has just launched a revolutionary smartphone which can be fully charged in under 20 minutes. This new technology has been brought about by a new battery design.

    The project team for Frampton’s latest product, the “xPhone”, has purchased a bulk order of their competitor’s phone in the hope of taking apart the phone and understanding the unique battery technology so they can apply the same technology to the xPhone.

    Which of the following terms best describes the activity that Frampton Ltd is carrying out?

    Correct
    Incorrect
  7. Question 7 of 15
    7. Question

    The SOC (System and Organization Controls) for Cybersecurity framework was developed by the AICPA (American Institute of Certified Professional Accountants) in 2017.

    There are three components to a SOC for Cybersecurity report.

    Which of the following are components of a SOC for Cybersecurity report?

    Select THREE that apply:

    Correct
    Incorrect
  8. Question 8 of 15
    8. Question

    Which of the following is a useful way of understanding how a code behind a malware works?

    Correct
    Incorrect
  9. Question 9 of 15
    9. Question

    Forensic analysis operates at which level:

    Correct
    Incorrect
  10. Question 10 of 15
    10. Question

    Zerg Ltd is an online retailer of sports supplements, the firm is large and the website deals with a heavy amount of users each day and so it is important that the website operates smoothly.

    Following a disagreement with a customer, the website was subject to a denial-of-service (DDoS) attack which put the website under strain and resulted in two-days of downtime, costing the firm over £2m in lost sales. Contractors from a specialist cybersecurity firm had to be used to fix the issue.

    The firm’s management is currently putting together the SOC (System and Organization Controls) for Cybersecurity report. As part of this, management is focusing on the nine categories of decision criteria that they will consider as part of the description criteria component of the report.

    Under which category will the DDoS attack be reported?

    Correct
    Incorrect
  11. Question 11 of 15
    11. Question

    Palo PLC is an online gambling firm, the firm operates a portfolio of websites that allow users to bet on horse races, sporting events and even political elections.

    Recently, a customer of Palo PLC lost a substantial amount of money on a sports bet. The customer sought revenge on the firm by launching a series of denial-of-service (DDoS) attacks which slowed several of Palo’s websites down and cost the firm £5m in lost revenues due to website downtime.

    After the attack ended, Palo PLC’s IT team launched a forensic analysis into the attack.

    Which of the following are valid reasons for carrying out the forensic analysis after the cyberattack?

    Select ALL that apply:

    Correct
    Incorrect
  12. Question 12 of 15
    12. Question

    Which of the following correctly defines MIKEY-SAKKE?

    Correct
    Incorrect
  13. Question 13 of 15
    13. Question

    The UK National Cyber Security Centre suggest that risk management techniques within a cybersecurity risk management plan (CRMP) should be:

    Correct
    Incorrect
  14. Question 14 of 15
    14. Question

    Bluelabs Ltd is a cybersecurity consulting firm, the firm operates in the UK and has many major clients across the world.

    The firm’s most popular service is penetration testing, the firm offers a complete package and ensures that a thorough and extensive check for vulnerabilities is carried out.

    What type of hacker group does Bluelabs Ltd belong to?

    Correct
    Incorrect
  15. Question 15 of 15
    15. Question

    Which one of the following activities would you not expect to see as part of a forensic analysis into a cyber security breach due to malware?

    Correct
    Incorrect

Recent Posts

  • Case Study Exam Results Out – Congratulations to IMAS Students
  • Top career paths with CIMA, ACCA & ICB accounting courses
    The 10 Highest-Paid Finance Jobs in South Africa
  • Best career opportunities with a CIMA qualification in SA
    7 Effective Tips That ACTUALLY Work For Finance Professionals!
  • Top career options with a CIMA qualification in South Africa
    The Ultimate Guide to Passing Your ICB Exams on the First Try
  • Best career opportunities with a CIMA qualification in SA
    Top 5 Amazing Careers You Can Get with a CIMA Qualification

Recent Comments

No comments to show.

Categories

  • ACCA (4)
  • Bookkeeping (1)
  • CIMA (11)
  • ICB (2)
  • Uncategorised (6)

+27 (0) 861 434 333
+27 (011) 331 7343

info@imas-sa.co.za
  • Follow
  • Follow
  • Follow
  • Follow

CIMA

CGMA-Finance-Leadership-Program-FLP

CIMA Professional Accountancy

Why CIMA

Johannesburg Timetable

CIMA Part Time Classes

CIMA Study Routes

CIMA Jobs

ACCA

ACCA Johannesburg

Why ACCA

ACCA Timetables

ACCA Accelerate Programme

Foundation in Accountancy

ICB
Icb Registration 2025

ICB Qualifications

Office Administration

Financial Accounting

Business Management
Imas-Sa © 2023 All rights reserved.
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account