BASE
EXAM DUMPS
CIPS
L6M7
28% OFF Automatically For You
Commercial Data Management
, 1.Which of the following approaches to cyber security takes a bottom-up approach to
assessing vulnerabilities meticulously item by item?
A. system approach
B. technology approach
C. elementary approach
D. component approach
Answer: D
Explanation:
This is the component approach - it looks at each individual component (each part of
the IT system)
in turn to check its okay. When a component is not directly controlled by the
organisation (e.g. something to do with a supplier) this is called a dependency.
Component approach is a bottom-up approach and is the opposite of the top-down
25
approach which is called the 'system driven approach'.
20
P.179
m
xa
Domain: 3.2
E
7
M
L6
S
2.Data Processing includes which of the following steps?
IP
C
A. Acquisition
r
ou
B. Reporting
Y
r
C. Controlling
fo
e
D. Processing
r
pa
E. Storing
re
-P
Answer: A, B, D, E
)
02
Explanation:
8.
The Data Processing cycle is acquisition - processing - reporting- storing. Do learn
(V
ps
this off by heart. The term processing means anything from using data, to altering it,
um
to moving it or publishing it. Data controller is a person or organisation that
D
determines how the data is processed, but it's rarely used as a verb (you don't say I'm
7
M
L6
'controlling' the data'). P. 121 Domain: 2.3
id
al
V
3.Francis bought a car 4 years ago and is unsure if the company has any data on her.
What can Francis do?
A. Make a Subject Access Request
B. Make a Freedom of Information Request
C. Nothing - the car company will not have data on her as this was 4 years ago
D. Nothing - the car company does not need to reveal what information it holds about
customers
Answer: A
Explanation:
Francis can make a Subject Access Request. This is when you ask what data do you