Get premium membership and access revision papers, questions with answers as well as video lessons.

Decm 032:Fraud Management And Technology Question Paper

Decm 032:Fraud Management And Technology 

Course:Diploma In Business Administration

Institution: Kenya Methodist University question papers

Exam Year:2010



FACULTY : BUSINESS AND MANAGEMENT STUDIES

DEPARTMENT : BUSINESS ADMINISTRATION

TIME : 2 HOURS

INSTRUCTIONS Answer Question ONE and any Other TWO Questions


Question 1

a) Maisha Bora Insurance company wants to assess its security needs accurately after suffering major losses this year from crime related activities. Discuss briefly the factors that should be considered in evaluating security needs. (10marks)

b) Identify the potential risks and issues that should be explored when an organization wants to establish security policy. (10marks)

c) Explain the term acceptable use policies. (5marks)

d) Explain the threats likely to affect the intellectual property assets of an IT Company.

(5marks)


Question 2

a) Explain why the security plan is important (5marks)

b) Jambo construction company wants to create a security plan after several cases of compromised security were observed in its premises. Discuss the personnel likely to be involved in designing this plan. (15marks)


Question 3

a) Kilimo Bora agriculture financiers want to classify threats in various ways. Identify and explain them briefly? (5marks)

b) Malysia stock brokers want to identify the people likely to pose or initiate threats to its operations. Identify and discuss them in detail. (15marks)


Question 4

a) Explain the term “organizational vulnerability” (4marks)

b) Zaidi Mobile money transfer agent wants to identify organizational vulnerabilities that could affect its operation and assets. Discuss them. (16marks)


Question 5

a) Explain the term employee piracy? (5marks)

b) Compare and contrast government standards and industry standards in a typical banking industry. (15marks)


Question 6

a) Define the term password policies? (5marks)

b) A comprehensive security policy should have the best password practices IT operations. Discuss them in detail. (15marks)






More Question Papers


Popular Exams



Return to Question Papers