Centre Candidate
number number
Surname
Forename(s)
Candidate ure
Level 3 Technical Level
IT: CYBER SECURITY
Unit 6 Network and cyber security administration
Thursday 16 May 2019 Morning Time allowed: 2 hours
Materials
For this paper you must have:
a ruler For Examiner’s Use
a scientific calculator (non-programmable) Questio Mark
stencils or other equipment (eg flowchart stencils). n
Instructions 1−5
Use black ink or black ball-point pen. 6
Fill in the boxes at the top of this page. 7
Answer all questions.
8
You must answer each question in the space provided. Do not
write outside the box around each page or on blank pages. 9
Do all rough work in this book. Cross through any work you do 10
not want to be marked. 11
If you need more space use the additional pages at the back of this booklet.
12
Information 13
The marks for questions are shown in brackets.
14
The maximum mark for this paper is 80. There are 50 marks for Section A
and 30 marks for Section B. Both sections should be attempted. 15
16
Advice
In all calculations, show clearly how you work out your answer. 17
Use diagrams, where appropriate, to clarify your answers. TOTAL
You are expected to use a calculator where appropriate.
You are reminded of the need for good English and clear
presentation in your answers.
*jUn19J507643501*
IB/M/Jun19/
E5
J/507/6435
, 2
Do not write
outside the
Section A box
Answer all questions in this
section.
0 1 The General Data Protection Regulation (GDPR) relates to
Tick () one box.
[1 mark]
control over personal data.
employee disability discrimination.
intellectual property and copyright.
regulation of security technologies.
0 2 ISO/IEC 27000 is part of the
Tick () one box.
[1 mark]
common vulnerability scoring system (CVSS)
information security management system (ISMS)
open web application security project (OWASP)
penetration testing execution standard (PTES)
*02
IB/M/Jun19/J/
* 507/6435
, 3
Do not
write
0 3 Reverse delta backup outside
box the
systems Tick () one box.
[1
mark]
log every change in the source data.
only contain complete system images.
organise data based on changes occurring at fixed intervals.
store a recent copy of the source data.
0 4 Which of these is a vulnerability scanner?
Tick () one box.
[1 mark]
Modbus
Honeypot
Nessus
SCADA
Turn over for the next question
*03
IB/M/Jun19/J/
* 507/6435