Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Level 3 Technical Level IT: CYBER SECURITY Unit 6 Network and cyber security administration Thursday 16 May 2019 Morning Time allowed: 2 hours Materials For this paper you must have: • a ruler • a scientific calculator (non-programmable) • sten

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
23-02-2022
Written in
2022/2023

Level 3 Technical Level IT: CYBER SECURITY Unit 6 Network and cyber security administration Thursday 16 May 2019 Morning Time allowed: 2 hours Materials For this paper you must have: • a ruler • a scientific calculator (non-programmable) • stencils or other equipment (eg flowchart stencils). Instructions • Use black ink or black ball-point pen. • Fill in the boxes at the top of this page. • Answer all questions. • You must answer each question in the space provided. Do not write outside the box around each page or on blank pages. • Do all rough work in this book. Cross through any work you do not want to be marked. • If you need more space use the additional pages at the back of this booklet. Information • The marks for questions are shown in brackets. • The maximum mark for this paper is 80. There are 50 marks for Section A and 30 marks for Section B. Both sections should be attempted. Advice • In all calculations, show clearly how you work out your answer. • Use diagrams, where appropriate, to clarify your answers. • You are expected to use a calculator where appropriate. • You are reminded of the need for good English and clear presentation in your answers. Section A Answer all questions in this section. outside the box The General Data Protection Regulation (GDPR) relates to Tick () one box. [1 mark] control over personal data. employee disability discrimination. intellectual property and copyright. regulation of security technologies. ISO/IEC 27000 is part of the Tick () one box. [1 mark] common vulnerability scoring system (CVSS) information security management system (ISMS) open web application security project (OWASP) penetration testing execution standard (PTES) Reverse delta backup systems Tick () one box. [1 mark] box log every change in the source data. only contain complete system images. organise data based on changes occurring at fixed intervals. store a recent copy of the source data. Which of these is a vulnerability scanner? Tick () one box. [1 mark] Modbus Honeypot Nessus SCADA Turn over for the next question Turn over ► Which of the following might be used in a side channel attack? Tick () one box. [1 mark] box Electromagnetic radiation Overlapping Wi-Fi channels Unused port numbers Weaknesses in an algorithm . Give two ways to identify that a website is theoretically secure. [2 marks] box 1 2 . State one benefit of a secure website compared to an insecure website. [1 mark] Explain the role of an ethical hacker. [3 marks] Turn over for the next question Turn over ► In a disaster recovery plan, an organisation identifies the need to guarantee recovery of data if there has been a fire. box Justify a method the organisation could use to back up 1.5 TB of data. [2 marks] Explain how Distributed Denial of Service (DDoS) attacks a network. [3 marks] Turn over for the next question box *07* Turn over ► Explain the difference between mandatory access control (MAC) and discretionary access control (DAC). box [2 marks] A protocol analyser and a port scanner are two network monitoring tools. 1 2 . 1 Identify three pieces of information a port scanner can provide. [3 marks] 1 2 3 *0* . Describe what a protocol analyser is used for. [3 marks] box . Name two other network monitoring tools. [2 marks] 1 2 Turn over for the next question Turn over ► box One way of targeting critical infrastructure is to collect information about an employee who has authorised access to the system. Discuss the types of information that might be collected about an employee to gain unauthorised access to the employer’s systems. box Include where you might find that information. [6 marks] Turn over for the next question Turn over ► box Turn over for Section B DO NOT WRITE ON THIS PAGE ANSWER IN THE SPACES PROVIDED box Turn over ► Section B Answer all questions in this section. box At the ENTZARUS headquarters, employees attach their laptops, tablets and mobile devices to the office network by using a wireless connection. You have been asked to develop a Wireless Communication policy for ENTZARUS. . Discuss the threats to company data and the measures you would include in the Wireless Communication policy to counter these threats. [12 marks] box 1 6 . 2 Give three ways a wireless network can be made more secure. [3 marks] 1 2 3 Turn over for the next question Turn over ► Cyber security is used to protect public and political infrastructures from attack. Discuss the reasons why a cyber attack might target public or political infrastructures. box In your answer you should include: • the perpetrators of an attack • the potential targets of an attack • the objectives and potential rewards or consequences of an attack • the methods that could be used in a cyber attack. [15 marks] box END OF QUESTIONS *17* Turn over ► If needed, use the following pages to continue your answers. Write the question number beside your answer. box *1* box *19* There are no questions printed on this page DO NOT WRITE ON THIS PAGE ANSWER IN THE SPACES PROVIDED box Copyright information For confidentiality purposes, from the November 2015 examination series, acknowledgements of third-party copyright material are published in a separate booklet rather than including them on the examination paper or support materials. This booklet is published after each examination series and is available for free download from after the live examination series. Permission to reproduce all copyright material has been applied for. In some cases, efforts to contact copyright-holders may have been unsuccessful and AQA will be happy to rectify any omissions of acknowledgements. If you have any queries please contact the Copyright Team, AQA, Stag Hill House, Guildford, GU2 7XJ. Copyright © 2019 AQA and its licensors. All rights reserved.

Show more Read less
Institution
Course

Content preview

Please write clearly in block capitals.


Centre Candidate
number number


Surname

Forename(s)

Candidate ure



Level 3 Technical Level
IT: CYBER SECURITY
Unit 6 Network and cyber security administration
Thursday 16 May 2019 Morning Time allowed: 2 hours
Materials
For this paper you must have:
 a ruler For Examiner’s Use
 a scientific calculator (non-programmable) Questio Mark
 stencils or other equipment (eg flowchart stencils). n
Instructions 1−5
 Use black ink or black ball-point pen. 6
 Fill in the boxes at the top of this page. 7
 Answer all questions.
8
 You must answer each question in the space provided. Do not
write outside the box around each page or on blank pages. 9
 Do all rough work in this book. Cross through any work you do 10
not want to be marked. 11
 If you need more space use the additional pages at the back of this booklet.
12
Information 13
 The marks for questions are shown in brackets.
14
 The maximum mark for this paper is 80. There are 50 marks for Section A
and 30 marks for Section B. Both sections should be attempted. 15
16
Advice
 In all calculations, show clearly how you work out your answer. 17
 Use diagrams, where appropriate, to clarify your answers. TOTAL
 You are expected to use a calculator where appropriate.
 You are reminded of the need for good English and clear
presentation in your answers.




*jUn19J507643501*
IB/M/Jun19/
E5
J/507/6435

, 2
Do not write
outside the
Section A box


Answer all questions in this
section.


0 1 The General Data Protection Regulation (GDPR) relates to

Tick () one box.
[1 mark]


control over personal data.


employee disability discrimination.


intellectual property and copyright.


regulation of security technologies.



0 2 ISO/IEC 27000 is part of the

Tick () one box.
[1 mark]


common vulnerability scoring system (CVSS)


information security management system (ISMS)


open web application security project (OWASP)


penetration testing execution standard (PTES)




*02
IB/M/Jun19/J/
* 507/6435

, 3
Do not
write
0 3 Reverse delta backup outside
box the


systems Tick () one box.
[1
mark]


log every change in the source data.


only contain complete system images.


organise data based on changes occurring at fixed intervals.


store a recent copy of the source data.



0 4 Which of these is a vulnerability scanner?

Tick () one box.
[1 mark]


Modbus


Honeypot


Nessus


SCADA




Turn over for the next question




*03
IB/M/Jun19/J/
* 507/6435

Written for

Institution
Course

Document information

Uploaded on
February 23, 2022
Number of pages
21
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$14.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ProAcademics Rasmussen College
Follow You need to be logged in order to follow users or courses
Sold
51
Member since
4 year
Number of followers
37
Documents
860
Last sold
2 weeks ago
ProAcademic Tutor-100%certified tutor

All Nursing material available from admission test to boards

4.7

113 reviews

5
92
4
15
3
3
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions