Related Questions

Study the following information carefully and answer the given questions. For a recruitment process in an ACCOUNTING organization, the candidates need to possess the following qualifications criteria: i) He/she must be a graduate in commerce with at least 60% marks. ii) He/she must be at least 24 years of age and not more than 40 years as of 1-7-2016. iii) He/she must have post-qualification work experience of at least 2 years. iv) He/she should have secured 55% marks in the selection process. However, if the candidate fulfills the above-mentioned criteria except: (A) at (i), and if the candidate is not a graduate in commerce but has a post-graduation degree in finance with a minimum of 60% marks, he/she should be referred to the Finance Manager of the organization. (B) at (iii), and if the candidate fulfills all the eligibility criteria of post-qualification work experience but has secured 75% marks in the selection process, he/she may be referred to the Trainee Accountant. Based on the above information, study carefully whether the following candidates are eligible for the recruitment process and mark your answer as follows. You are not to assume anything other than the information provided in each question. All the cases are given to you as of 1-7-2016. Snehlata’s date of birth is 6.2.1990. She has done her graduation and post-graduation in Commerce and secured 61% and 63% marks respectively. She has post-qualification work experience as a Senior Accountant of 3.5 years. She has secured 58.5% marks in the selection process.
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.