Which of the following approaches to cyber security takes a bottom-up approach to assessing vulnerabilities meticulously item by item?
Answer(s): D
This is the component approach - it looks at each individual component (each part of the IT system) in turn to check its okay. When a component is not directly controlled by the organisation (e.g. something to do with a supplier) this is called a dependency. Component approach is a bottom-up approach and is the opposite of the top-down approach which is called the 'system driven approach'.P.179Domain: 3.2
Data Processing includes which of the following steps?
Answer(s): A,B,D,E
The Data Processing cycle is acquisition - processing - reporting- storing. Do learn this off by heart. The term processing means anything from using data, to altering it, to moving it or publishing it. Data controller is a person or organisation that determines how the data is processed, but it's rarely used as a verb (you don't say I'm 'controlling' the data'). P. 121 Domain: 2.3
Francis bought a car 4 years ago and is unsure if the company has any data on her. What can Francis do?
Answer(s): A
Francis can make a Subject Access Request. This is when you ask what data do you hold about me. The company must respond within 40 calendar days. A Freedom of Information request is different-this is when a member of the public asks the government to reveal information such as 'how much money have you spent on replacing toilet seats in Parliament?'. P.127 Domain: 2.3
In order to keep data secure, which three things should be considered?
This is the CIA triangle which is from p.143. The three aspects are the three corners of the triangle. Remember this one for the exam as I've heard it comes up frequently. Just remember data security = CIA = confidentiality, integrity and availability.Domain: 3.1
A person who enters into another person's computer via illegal means for personal gain, for example to steal data which will benefit them personally, is known as what?
This is a black hat hacker. The colour of hat the hacker wears describes their motivation. Black is bad, white is good and grey means they're hacking on behalf of a government. Black swan is about finding patterns in data that don't exist and came up in an earlier chapter. Black-hat hacking is from p.147. I don't think hackers are obliged to wear hats, it's probably just a metaphor, but I've never met one to ask.Domain: 3.1
David works in the Accounts department of Touchdown Ltd. He has received an email from a sender he is unfamiliar with. The email asks him to look at an invoice which the sender believes includes an error. There is an attachment to the email. David has recently undergone Cyber Security training and is suspicious of the email. What type of security threat does David think the email contains?
Answer(s): B
This is an example of a phishing email. Phishing is when a cybercriminal tries to do something malicious like steal data or put a virus on your computer by deceiving the user. In this case, they're pretending to be a supplier and want David to open an email attachment, which is probably not an invoice. See p.148Domain: 3.1
In relation to cyber security, what would be the benefit of a public sector organisation joining a Group Purchasing Organisation (GPO)?
Answer(s): C
A GPO is the same as a Buying Consortium--it's when multiple organisations pool resources and procure together. The GPO/Consortium does the legwork for procurement activities such as vetting suppliers. This is one advantage of using them--they have the expertise to weed out unsuitable suppliers. Option A is a true statement but doesn't relate to cyber security. P.167 Domain: 3.1
Zach is the Head of Procurement at a super secret military base. He does not want anyone outside of the base to know what he is procuring or which suppliers he uses as this information could be critical to national defence. He is aware that cyber criminals may be interested in stealing this information so he has decided to disconnect critical machines and systems from the internet. What is this approach to data security known as?
This is air-gapping. Air-gapping is when you disconnect from an outside network such as the internet.P.171Domain: 3.1
Post your Comments and Discuss CIPS L6M7 exam prep with other Community members:
Charlie5 Commented on July 07, 2025 These questions are much better and explanations are much better that others that I've seen. UNITED STATES
SDL Commented on July 07, 2025 the questions and responses are ok Anonymous
Phany Commented on July 07, 2025 Really usefull POLAND
Charlie5 Commented on July 07, 2025 This material is on point to what I need to learn..and not just for the test! UNITED STATES
Charlie5 Commented on July 07, 2025 Good explanations. UNITED STATES
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the L6M7 content, but please register or login to continue.