2. Modification vulnerability is exploited when a. when an unauthorised person or application gains access to restricted computer resources b. data is accessed by hardware or software c. the data is changed in an unauthorised manner d. computer system becomes unavailable for use Selection:…………….. 3. Which of the following is the most serious software threat? a. Identity theft b. An unapproved routine has been inserted in the software c. The program is not thoroughly tested d. The software is difficult to use Selection:…………….. 4. Integrity of data implies a. privacy of data b. data and programs are changed in an authorised manner c. message is from a source it claims to be from d. a party cannot deny an activity it participated in Selection:…………….. 5. The effectiveness of the security policy is a function of ——– a. availability of the technology b. investment in technology c. the level of support it has from executive leadership d. financial support from the organization Selection:…………….. 6. Structures of responsibility in formal information system security define —- a. the locations of firewalls in the organisation b. the pattern of authority in the organisation c. who in the organisation can use computing resources d. who has access to organisation’s network Selection:…………….. 7. Formal information handling in organizations works very well when, a. an organisation is large in size b. an organisation has strong information technology infrastructure c. an organisation has stable structures over time d. employees are knowledgeable Selection:……………..