An investigation into a cyber-attack on a highly-competitive supply chain (A2Z) company found that the hackers had not set out their attack to steal data, or create a ransom, rather it corrupted the data. This made the data inaccessible for the organisation and therefore trading had to cease, meaning that competitors were able to use seize the opportunity and gain market share. The investigation report suggested that if A2Z was severely lacking sufficient polices, procedures and protection. Despite believing that the hacker was infact one of their competitors, A2Z issued an advise and warning announcement telling them to use software solutions that disguises their company data using a code, where the data is converted from a readable format to one where only the key (a correct set of instructions) can make the data readable again. Additionally, they also suggested implementing security measures to automatically scan files to prevent, detect and search for, and remove viruses. Which TWO cyber-security suggestions did A2Z make?
Bruno is the newly appointed Head of Operations of a manufacturing organisation based in Coventry that makes children's toys. The company was established in 1958 and has many years of records of toys sold. Some of the early records are paper-based, but data from the 1990s onwards is computerbased. Bruno believes that as the company acquired the data legally, it should be stored in the office and can be used for marketing purposes. Is this true?
When comparing Business Intelligence (BI) with Data Analytics, select ALL characteristics of Analytics
The speed at which data can be transferred and accessed over the internet is known as ¦ ?
Wiggles Ltd works closely with a supplier called Waggles Incorporated. They are considering a merger but this is not yet public knowledge. The CEOs of each organisation have acknowledged the risk of cyber security in relation to the negotiation and have decided to restrict communications between the organisations on the matter to only a few select individuals. What form of cyber threat does this reduce?
© Copyrights FreePDFQuestions 2026. All Rights Reserved
We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.