100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Unit 11 Cyber Security and Incident Managment Exam Guide

Rating
5.0
(1)
Sold
7
Pages
46
Uploaded on
23-04-2024
Written in
2023/2024

Prepare for success in Unit 11: Cybersecurity and Incident Management with our comprehensive exam guide. This document is meticulously crafted to equip learners with essential exam tips, detailed example answers, and insightful activity breakdowns, ensuring thorough comprehension and effective exam performance. Key Features: Exam Tips: Unlock insider strategies and techniques to excel in your Unit 11 exam. From time management to question interpretation, discover valuable tips curated to enhance your performance and confidence on exam day. Example Answers: Gain clarity and mastery of Unit 11 concepts through annotated example answers. These exemplars showcase model responses, providing invaluable guidance on structuring your own answers and addressing exam requirements effectively. Activity Breakdowns: Dive deep into Unit 11 topics with comprehensive breakdowns of key activities. From risk assessment methodologies to incident response protocols, each activity is dissected to facilitate understanding and application in exam scenarios.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
April 23, 2024
Number of pages
46
Written in
2023/2024
Type
Other
Person
Unknown

Subjects

Content preview

UNIT 11 – CYBER SECURITY
AND INCIDENT
MANAGEMNT
Revision Guide


Abstract
Guide which covers the Unit 11: Cyber Security and Incident Management exam. Both part A
and Part B are covered.




Stuart Hazelden
[Email address]

,Contents
Introduction ............................................................................................................................................ 3
Part A ...................................................................................................................................................... 3
An Overview ........................................................................................................................................ 3
Key points ............................................................................................................................................ 3
Extras................................................................................................................................................... 3
Task File Names ............................................................................................................................... 3
The Scenario........................................................................................................................................ 4
Example Scenario ............................................................................................................................ 4
Activity 1 - Risk assessment of the networked system ......................................................................... 7
Key points ............................................................................................................................................ 7
Template Example ............................................................................................................................... 8
Example of using Risk Matrix .......................................................................................................... 8
Risk assessment template explained. ............................................................................................. 9
Example responses.............................................................................................................................. 9
Example 1 – Poor ............................................................................................................................ 9
Example 2 – Okay ............................................................................................................................ 9
Example 3 – Good ......................................................................................................................... 10
Additional notes ................................................................................................................................ 11
Activity 2 - Cyber security plan for the networked system ................................................................. 12
Key points .......................................................................................................................................... 12
Example Template ............................................................................................................................. 13
Template Explained ....................................................................................................................... 14
Example Responses ........................................................................................................................... 15
Band 3 Response ........................................................................................................................... 15
Band 2 (low end of band) .............................................................................................................. 16
Additional notes ................................................................................................................................ 17
Activity 3 – Management report justifying the solution ..................................................................... 18
Key points .......................................................................................................................................... 18
Example Responses ........................................................................................................................... 19
Example 1 – Band 1 to 2 ................................................................................................................ 19
Example 2 – Band 2 to 3 (High 2 / Low 3) ..................................................................................... 20
Example 3 – Band 3 ....................................................................................................................... 21
Additional notes ................................................................................................................................ 21
Task B .................................................................................................................................................... 22
An overview ...................................................................................................................................... 22

1

, Key points .......................................................................................................................................... 22
Extras................................................................................................................................................. 22
Task file names .............................................................................................................................. 22
The Scenario...................................................................................................................................... 23
Example Scenario .......................................................................................................................... 23
Activity 4 - Forensic incident analysis .................................................................................................. 33
Key points .......................................................................................................................................... 33
Template Example ............................................................................................................................. 33
Example Responses ........................................................................................................................... 35
Example 1 – Band 3 ....................................................................................................................... 35
Example 2 – Band 3 ....................................................................................................................... 36
Example 3 – Conclusion ................................................................................................................ 37
Additional notes ................................................................................................................................ 37
Activity 5: Security report .................................................................................................................... 38
Key points .......................................................................................................................................... 38
Layout overview ................................................................................................................................ 38
Example responses............................................................................................................................ 40
Example 1 ...................................................................................................................................... 40
Example 2 - Band 3 (18/20) ........................................................................................................... 41
Example 3 - Band 1/2 .................................................................................................................... 42
Additional notes ................................................................................................................................ 42
Extras..................................................................................................................................................... 43
Mark schemes ................................................................................................................................... 43




2

, Introduction

This booklet is designed to give an overview of the task which you will be expected to complete and
some which you should consider when undertaking on the exam day(s)



Part A
An Overview

Part A consist of 3 activities which will based around the scenario presented in the exam paper. You
will be expected to produce the following within the 5 hours given:

• Risk assessment
• Cyber Security Plan
• Management report



For the Risk assessment and security plan, you will be provided with templates which you will need
to use to complete the tasks. The 5 hours could be spilt over 2 days; however, this is dependent on
the exam arrangements at the time.



Key points

• 5hrs total time for part A (additional time given for those that qualify)
• 43 marks available (includes marks for technical language)
• Tasks must be saved using the name given, these are provided on each task.
• Each task will need to be saved as a PDF, only do this at the end of the 5hrs.
• DO NOT use any auto save functions.



Extras
Task File Names
• Activity 1 - activity1_riskassessment_[Registration number #]_[surname]_[first letter of first
name]
• Activity 2 - activity2_securityplan_[Registration number #]_[surname]_[first letter of first
name]
• Activity 3 - activity3_managementreport_[Registration number #]_[surname]_[first letter of
first name]




3

Reviews from verified buyers

Showing all reviews
10 months ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
stuart_hazelden college
Follow You need to be logged in order to follow users or courses
Sold
11
Member since
2 year
Number of followers
5
Documents
2
Last sold
2 months ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions