Henry is the Head of IT at Purple Rain Ltd and is presenting a case to the Senior Leadership Team to ask for more investment in the company's IT strategy. Henry believes the company has an issue with data resilience and is asking for more money to be invested in this. He has completed a Business Impact Assessment (BIA) to better understand what data the company holds. Jon is the Head of Procurement and has listened intently to Henry's presentation. He has decided to go back to his department and complete a thorough risk assessment, as he is aware his team holds a lot of data on suppliers and contracts. The CEO of Purple Rain, Roger Nelson, has asked Henry about next steps in order to protect the company from further risks associated with the IT strategy. Data is currently stored on servers located at Purple Rain's Headquarters. The server room is locked at all times of the day and is only accessible to staff members who have a key. The building itself is extremely secure with CCTV systems located both inside the server room and outside it. However, the server room is prone to overheating.
What should Henry's next steps be?
Given Henry's focus on data resilience, the next logical step is to complete a Priority Assessment and define Recovery Objectives. This will help identify which data and systems are most at risk and require immediate attention in the Data Resilience Plan. (P.105)
Data Processing includes which of the following steps?
The Data Processing cycle is acquisition - processing - reporting- storing. Do learn this off by heart. The term processing means anything from using data, to altering it, to moving it or publishing it. Data controller is a person or organisation that determines how the data is processed, but it's rarely used as a verb (you don't say I'm 'controlling' the data'). P. 121
Domain: 2.3
Which of the following actions can help an organisation improve the security of their router? Select ALL that apply
The correct answers are B and C. Not all routers have a firewall, but if they do, it should be used. Option A is incorrect because the router should be placed in a secure location. Option D is incorrect because you can't run a script on a router. P.195
Domain: 3.2
Which of the following are benefits of using smart sensors in a manufacturing factory? Select ALL that apply.
All options are correct. Smart sensors help in worker tracking, machine monitoring, forecasting, and stock control.
Which of the following would be considered personal data? Select ALL that apply
Personal data is anything that can be used to identify someone, so options A and D are correct. Examples of personal data include any form of ID number, addresses, dates of birth, bank details, DNA, or medical information. Option B is incorrect because it's an average age, not a person's age. Option C is incorrect because you can't identify someone from the time they entered a car park. P.120
Domain: 2.3
Shawna
Nobuko
2 months agoChun
3 months agoShawna
3 months agoAvery
3 months agoLina
4 months agoMee
4 months agoHelaine
4 months agoViola
5 months agoElly
5 months agoSalina
5 months agoCherry
6 months agoWeldon
6 months agoGlynda
7 months agoMaryanne
7 months agoFelicitas
7 months ago