• Home
  • About Us
    • Our Vision & Mission
    • Why Imas
      • How to Start IMAS
      • Open Days
    • IMAS Accredations
    • Board of Directors
    • Testimonial
  • CIMA
    • CGMA-Finance-Leadership-Program-FLP
    • CIMA Professional Accountancy
    • Why CIMA
      • CIMA Study Option
    • CIMA Study Routes
      • CIMA Gateway Routes
      • CIMA GLOBAL CA PROGRAMME
      • Cima certification in business Accounting
      • CIMA Professional Qualification
    • CIMA Part Time Classes
  • ACCA
    • ACCA Accelerate Programme
    • Acca Campus
      • ACCA Johannesburg
    • How to start ACCA
    • Why ACCA
      • Acca Study Options
    • Foundation in Accountancy
  • ICB
    • Icb Registration 2025
    • Open Day
    • ICB Qualifications
    • Financial Accounting
    • Office Administration
  • Contact Us
  • Short Courses
  • Blogs
  • Open Days
  • Login
Apply now

P3 Chapter 9 Quiz

by imasnew | May 20, 2025

Time limit: 0

Quiz Summary

0 of 15 Questions completed

Questions:

Information

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading…

You must sign in or sign up to start the quiz.

You must first complete the following:

Results

Quiz complete. Results are being recorded.

Results

0 of 15 Questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 point(s), (0)

Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)

Categories

  1. Not categorized 0%
Would you like to submit your quiz result to the leaderboard?
Loading
captcha
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  1. Current
  2. Review
  3. Answered
  4. Correct
  5. Incorrect
  1. Question 1 of 15
    1. Question

    Kajol is a chemistry student who is writing a research paper. She is currently using an old laptop and wants to store her work in a manner that it’s not affected by a laptop malfunctioning.

    Which of the following can be used to create a back-up of Kajol’s data?

    Correct
    Incorrect
  2. Question 2 of 15
    2. Question

    Outsourcing the IT functions to back office processing companies is an example of which approach to risk management?

    Correct
    Incorrect
  3. Question 3 of 15
    3. Question

    Liam recently received a new version of an anti-virus software. The update addresses a known vulnerability and provides a new and improved version of the software.

    Which of the following can this be classified as?

    Correct
    Incorrect
  4. Question 4 of 15
    4. Question

    Which of the following most accurately describe ‘encryption’?

    Correct
    Incorrect
  5. Question 5 of 15
    5. Question

    Which of the following most accurately describes ‘internet of things’? 

    Correct
    Incorrect
  6. Question 6 of 15
    6. Question

    Input, processing and output controls are examples of:

    Correct
    Incorrect
  7. Question 7 of 15
    7. Question

    Which of the following most accurately defines ‘firewall’?

    Correct
    Incorrect
  8. Question 8 of 15
    8. Question

    Mia reviews the Facebook profile of every person who sends her a friendship request. This is an example of which strategy regarding cyber risk?

    Correct
    Incorrect
  9. Question 9 of 15
    9. Question

    Acquisition, Maintenance and Updates are examples of:

    Correct
    Incorrect
  10. Question 10 of 15
    10. Question

    Personnel cybersecurity planning includes (select ALL that apply):

    Correct
    Incorrect
  11. Question 11 of 15
    11. Question

    Which of the following are examples of devices that can be exploited to gather data through the internet of things? (Select ALL that apply)

    Correct
    Incorrect
  12. Question 12 of 15
    12. Question

    Sophisticated encryption techniques include (select ALL that apply):

    Correct
    Incorrect
  13. Question 13 of 15
    13. Question

    Cybersecurity controls can be (select ALL that apply):

    Correct
    Incorrect
  14. Question 14 of 15
    14. Question

    The Company Astron found that at least 80% of all cybersecurity incidents have arisen from malware caused by staff clicking on bogus emails. What would be the appropriate form of response?

    Correct
    Incorrect
  15. Question 15 of 15
    15. Question

    Kim has been hired as a cyber security specialist by an organization. Her first order of business has been to describe strategies that organizations can use to identify the risk an organization faces from third parties. 

    She explains to management that they should always assume that the organization’s systems will eventually be hacked into and should have a contingency plan in place for whenever that happens.

    Which of the following is Kim describing above?

    Correct
    Incorrect

Recent Posts

  • Case Study Exam Results Out – Congratulations to IMAS Students
  • Top career paths with CIMA, ACCA & ICB accounting courses
    The 10 Highest-Paid Finance Jobs in South Africa
  • Best career opportunities with a CIMA qualification in SA
    7 Effective Tips That ACTUALLY Work For Finance Professionals!
  • Top career options with a CIMA qualification in South Africa
    The Ultimate Guide to Passing Your ICB Exams on the First Try
  • Best career opportunities with a CIMA qualification in SA
    Top 5 Amazing Careers You Can Get with a CIMA Qualification

Recent Comments

No comments to show.

Categories

  • ACCA (4)
  • Bookkeeping (1)
  • CIMA (11)
  • ICB (2)
  • Uncategorised (6)

+27 (0) 861 434 333
+27 (011) 331 7343

info@imas-sa.co.za
  • Follow
  • Follow
  • Follow
  • Follow

CIMA

CGMA-Finance-Leadership-Program-FLP

CIMA Professional Accountancy

Why CIMA

Johannesburg Timetable

CIMA Part Time Classes

CIMA Study Routes

CIMA Jobs

ACCA

ACCA Johannesburg

Why ACCA

ACCA Timetables

ACCA Accelerate Programme

Foundation in Accountancy

ICB
Icb Registration 2025

ICB Qualifications

Office Administration

Financial Accounting

Business Management
Imas-Sa © 2023 All rights reserved.
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account