QCAA Digital Solutions Complex digital data exchange problems and solution requirements
5 sample questions with marking guides and sample answers · Avg. score: 0%
A school is developing a class timetabling solution for their students.
Which is not an essential data store for the initial iteration of the app?
teacher
subject
student
assessment
A user accidentally modifies critical data in a shared document. This is a compromise of data
access.
integrity.
availability.
confidentiality.
Refer to Stimulus 3 in the stimulus book.
A secondary school stores encrypted student results in a database. To access their results, students must log in using their student ID and password. Login details are checked against the database to ensure only authorised students can gain access.
Passwords are encrypted for added security. Once logged in, students must enter a public decryption key to have their results displayed.
The database contains overall results for all subjects and students. Only results linked to the relevant student ID are displayed; students cannot view other students' results.
The algorithm for this system is incomplete. Complete the algorithm using the supplied code library.
BEGIN
GET studentID from input form
GET password from input form
GET key from input form
A mobile application (app) allows car owners to remotely unlock their cars if they lock the keys inside or their keys malfunction. Once users have created an account, they can request a remote unlock by entering their username and password.
The user data that is required to set up an account includes:
- full name
- date of birth
- home address
- driver licence number
- vehicle make, model and colour
- vehicle registration.
Analyse the information and evaluate risks to data confidentiality, integrity and availability for this app. Justify your response with three examples.
Identify a relevant Australian Privacy Principle and explain an ethical consideration when using app data.
You discover that the app uses a Caesar cipher to encrypt data, allowing you to intercept a password in transit. Perform a desk check for five iterations to decrypt the password ‘KYIWW’.
A friend is interested in learning more about encryption. Use pseudocode to symbolise a simple Caesar cipher as a demonstration.
Refer to Stimulus 1 in the stimulus book.
A hospital has installed a state-of-the-art boom gate at the entrance to the staff car park. The boom gate scans and records numberplates and requires drivers to swipe their ID card for access.
Identify three Australian Privacy Principles that apply to the use of personally identifiable or sensitive data and explain how the hospital could implement each principle.
Analyse the scenario to determine a risk to data confidentiality, integrity and availability and make a recommendation for reducing each of these risks.