Modern Technologies
Cyber Security
Wider Implications of Digital Systems
Planning and Communication
Advanced Questions
100

This cloud feature allows a team to work on a single version of a file simultaneously.

What is Collaboration?

100

A security method requiring "who you are, what you know, and what you have" before granting access.

What is Two-Factor Authentication (2FA)?

100

The legal right for an individual to have their personal data removed from internet searches and records.

What is the Right to be Forgotten?

100

A visual notation used to represent a process or a step-by-step solution to a problem.

What is a Flowchart?

200

A method of sharing a mobile device's internet connection with other devices to create an ad hoc network.

What is Tethering (or Personal Hotspot)?

200

Malicious software such as viruses, worms, botnets, and ransomware.

What is Malware?

200

These are used to identify and protect an organisation's creations, such as trademarks, patents, and copyrights.

What is Intellectual Property (IP)?

200

This form of notation uses rows and columns to organize and represent data for quick reference or comparison.

What is a Table?

200

When an organization transitions to cloud technologies, they must evaluate the service provider’s security procedures and their own "Disaster Recovery Policy". Explain why the compatibility of existing infrastructure and staff expertise are critical risks during this transition.

What are Implications for Organizations?

 Organizations must ensure their current devices can communicate with the cloud and that staff have the technical skills to maintain the new system without significant downtime.

300

The ability to increase or decrease IT resources, such as storage, by renting more or freeing up space to save money.

What are World (or Distributed) Teams?

300

This internal threat occurs when an employee accidentally shares sensitive data without meaning to.

What is Unintentional Disclosure?

300

The principle that all internet traffic should be treated equally by service providers without discrimination.

What is Net Neutrality?

300

A diagrammatic form of notation that specifically maps out the flow of data within a digital system.

What is a Data Flow Diagram (DFD)?

300

An organization discovers that a "Black Hat" hacker has gained "Unauthorised Access" to their server. Following the Actions to Take After an Attack protocol, identify the stage that involves informing appropriate authorities and the stage that involves updating policies to prevent a repeat.

What are Respond and Analyse? 

"Respond" involves updating stakeholders and authorities , while "Analyse" is the final step where policies and procedures are updated based on what was learned.

400

The ability to increase or decrease IT resources, such as storage, by renting more or freeing up space to save money.

What is Scalability?

400

The process of "white hat" hackers testing a system for vulnerabilities to improve its security.

What is Penetration Testing (or Ethical Hacking)?

400

Small files used by websites to track user activity and store transactional data.

What are Cookies?

400

In a Data Flow Diagram (DFD), this specific component is used to represent a place where data is held or kept for later use.

What is a Data Store?

400

Under the Data Protection Principles, organizations must ensure data is processed lawfully and not transferred to countries with less protection. Identify the principle that restricts an organization from keeping a customer's data indefinitely.

"Kept only as long as is necessary"?

This principle ensures that data is not stored for longer than its original specific purpose requires.



500

This type of policy defines how an organisation and its service provider will restore data and systems after a major failure.

What is a Disaster Recovery Policy?

500

A specific cyber attack that redirects a user from a legitimate website to a fake one to steal their data.

What is Pharming?

500

This document defines the expected and prohibited behaviors for individuals using an organisation’s IT assets .

What is an Acceptable Use Policy (AUP)?

500

Draw an example of a flowchart segment where a process repeats until a specific condition is met making a loop

500

When using forms of notation to represent a system, a student must differentiate between a flowchart and a Data Flow Diagram (DFD). While a flowchart shows the sequence of steps, what specific notation is used in a DFD to represent the movement of data between an "external entity" and a "process"?.

What is a Data Flow (or Data Flow Arrow)? 

DFDs use standard conventions to show how data is exchanged between entities, processes, and data stores.

M
e
n
u