CSS747
to protect the critical information infrastructure, countries should have ….. regarding cyber vulnerabilities, threats, and incidents
agents
information system
—>> emergency warning networks
mercenaries
The sustainability of the …….. is determined by its level of security
facilities
social amenities
critical ifrastructure
—>> digital infrastructure
Organizations need to address the security of electronically shared documents to guaranttee
—>> security of information
excellence
patronage
none of the options
……is described as any tool, technique, or process used to protect a system’s information assets
Digital security
—>> Electronic security
Technological security
Computer security
……is the process of transforming information from plaintext into an incomprehensible form known as ciphertext
—>> Encryption
decryption
Description
prescrition
One of the key roles of the public sector in electronic security is to mitigate the risks of
e-machine
digital marketing
—>> electronic transactions
e-transport
Financial Action Task Force (FATF) principle XIII stipulates that knowledge of one ……. is critical in deterring money laundering
—>> customers
drivers
solicitors
risk bearers
The following are among the problems that the online voting solution should address except ……..
Voter authentication
voter secrecy
Safety of caste votes
—>> treating
An e-finance legal framework should consist of the following except ……..
Privacy law
e-transaction law
—>> property law
cybercrime law
One of the venues for electronic attacks in the area of e-financial services is …….
—>> identity theft
face to face interaction
computer theft
imagery
JOIN OUR TELEGRAM ON VIP NOUN UPDATES – FOR FREE CSS747 PAST QUESTIONS AND EXAMS SUMMARIES