jun19j507643501 j5076435 ibmjun19e5 level 3 technical level it cyber security unit 6 network and cyber security administration thursday 16 may 2019 morning time allowed 2 hours materials for
Level 3 Technical Level
IT: CYBER SECURITY
Unit 6 Network and cyber security administration
Thursday 16 May 2019 Morning Time allowed: 2 hours
Materials
For this paper you must have:
a ruler For Examiner’s Use
a scientific calculator (non-programmable)
Question Mark
stencils or other equipment (eg flowchart stencils).
1−5
Instructions
6
Use black ink or black ball-point pen.
Fill in the boxes at the top of this page. 7
Answer all questions. 8
You must answer each question in the space provided. Do not write outside 9
the box around each page or on blank pages.
10
Do all rough work in this book. Cross through any work you do not want to
be marked. 11
If you need more space use the additional pages at the back of this booklet. 12
Information 13
The marks for questions are shown in brackets. 14
The maximum mark for this paper is 80. There are 50 marks for Section A
15
and 30 marks for Section B. Both sections should be attempted.
16
Advice
17
In all calculations, show clearly how you work out your answer.
Use diagrams, where appropriate, to clarify your answers. TOTAL
You are expected to use a calculator where appropriate.
You are reminded of the need for good English and clear presentation
in your answers.
*jUn19J507643501*
IB/M/Jun19/E5 J/507/6435
, 2
Do not write
outside the
Section A box
Answer all questions in this section.
0 1 The General Data Protection Regulation (GDPR) relates to
Tick () one box.
[1 mark]
control over personal data.
employee disability discrimination.
intellectual property and copyright.
regulation of security technologies.
0 2 ISO/IEC 27000 is part of the
Tick () one box.
[1 mark]
common vulnerability scoring system (CVSS)
information security management system (ISMS)
open web application security project (OWASP)
penetration testing execution standard (PTES)
*02*
IB/M/Jun19/J/507/6435
, 3
Do not write
outside the
box
0 3 Reverse delta backup systems
Tick () one box.
[1 mark]
log every change in the source data.
only contain complete system images.
organise data based on changes occurring at fixed intervals.
store a recent copy of the source data.
0 4 Which of these is a vulnerability scanner?
Tick () one box.
[1 mark]
Modbus
Honeypot
Nessus
SCADA
Turn over for the next question
*03*
IB/M/Jun19/J/507/6435
, 4
Turn over ► Do not write
outside the
*03*
IB/M/Jun19/J/507/6435
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller keenstar. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £11.06. You're not tied to anything after your purchase.