Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Hot Vendors

CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Questions and Answers

Questions 4

Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?

1. Intellectual Property Rights.

2. Protection of Organisational Records

3. Forensic recovery of data.

4. Data Deduplication.

5. Data Protection & Privacy.

Options:

A.

1, 2 and 3

B.

3, 4 and 5

C.

2, 3 and 4

D.

1, 2 and 5

Buy Now
Questions 5

When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?

Options:

A.

Digital evidence must not be altered unless absolutely necessary.

B.

Acquiring digital evidence cart only be carried on digital devices which have been turned off.

C.

Digital evidence can only be handled by a member of law enforcement.

D.

Digital devices must be forensically "clean" before investigation.

Buy Now
Questions 6

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

Options:

A.

Task based access control.

B.

Role based access control.

C.

Rule based access control.

D.

Mandatory access control.

Buy Now
Questions 7

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?

Options:

A.

Appropriate company accreditation and staff certification.

B.

Formal certification to ISO/IEC 27001 and alignment with ISO 17025.

C.

Affiliation with local law enforcement bodies and local government regulations.

D.

Clean credit references as well as international experience.

Buy Now
Questions 8

What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?

Options:

A.

Poor Password Management.

B.

Insecure Deserialsiation.

C.

Injection Flaws.

D.

Security Misconfiguration

Buy Now
Questions 9

Which membership based organisation produces international standards, which cover good practice for information assurance?

Options:

A.

BSI.

B.

IETF.

C.

OWASP.

D.

ISF.

Buy Now
Questions 10

When securing a wireless network, which of the following is NOT best practice?

Options:

A.

Using WPA encryption on the wireless network.

B.

Use MAC tittering on a SOHO network with a smart group of clients.

C.

Dedicating an access point on a dedicated VLAN connected to a firewall.

D.

Turning on SSID broadcasts to advertise security levels.

Buy Now
Questions 11

Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?

Options:

A.

Strong OS patch management

B.

Vulnerability assessment

C.

Signature-based intrusion detection.

D.

Anomaly based intrusion detection.

Buy Now
Questions 12

Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?

Options:

A.

Online retailer.

B.

Traditional market trader.

C.

Mail delivery business.

D.

Agricultural producer.

Buy Now
Questions 13

Why should a loading bay NEVER be used as a staff entrance?

Options:

A.

Loading bays are intrinsically vulnerable, so minimising the people traffic makes securing the areas easier and more effective.

B.

Loading bays are often dirty places, and staff could find their clothing damaged or made less appropriate for the office.

C.

Most countries have specific legislation covering loading bays and breaching this could impact on insurance status.

D.

Staff should always enter a facility via a dedicated entrance to ensure smooth access and egress.

Buy Now
Questions 14

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?

Options:

A.

TOGAF

B.

SABSA

C.

PCI DSS.

D.

OWASP.

Buy Now
Questions 15

Ensuring the correctness of data inputted to a system is an example of which facet of information security?

Options:

A.

Confidentiality.

B.

Integrity.

C.

Availability.

D.

Authenticity.

Buy Now
Questions 16

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

Options:

A.

Risk = Likelihood * Impact.

B.

Risk = Likelihood / Impact.

C.

Risk = Vulnerability / Threat.

D.

Risk = Threat * Likelihood.

Buy Now
Questions 17

Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?

Options:

A.

Dynamic Testing.

B.

Static Testing.

C.

User Testing.

D.

Penetration Testing.

Buy Now
Questions 18

Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?

Options:

A.

A large increase in remote workers operating in insecure premises.

B.

Additional physical security requirements at data centres and corporate headquarters.

C.

Increased demand on service desks as users need additional tools such as VPNs.

D.

An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.

Buy Now
Questions 19

When an organisation decides to operate on the public cloud, what does it lose?

Options:

A.

The right to audit and monitor access to its information.

B.

Control over Intellectual Property Rights relating to its applications.

C.

Physical access to the servers hosting its information.

D.

The ability to determine in which geographies the information is stored.

Buy Now
Questions 20

Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?

Options:

A.

PCI DSS.

B.

TOGAF.

C.

ENISA NIS.

D.

Sarbanes-Oxiey

Buy Now
Questions 21

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

Options:

A.

System Integrity.

B.

Sandboxing.

C.

Intrusion Prevention System.

D.

Defence in depth.

Buy Now
Questions 22

Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?

Options:

A.

Under the European Convention of Human Rights, the interception of telecommunications represents an interference with the right to privacy.

B.

GDPR overrides all previous legislation on information handling, so new laws were needed to ensure authorities did not inadvertently break the law.

C.

Police could previously intercept without lawful authority any communications in the course of transmission through a public post or telecoms system.

D.

Surveillance of a conversation or an online message by law enforcement agents was previously illegal due to the 1950 version of the Human Rights Convention.

Buy Now
Questions 23

James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.

What type of software programme is this?

Options:

A.

Free Source.

B.

Proprietary Source.

C.

Interpreted Source.

D.

Open Source.

Buy Now
Questions 24

In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?

Options:

A.

Guest Manager

B.

Hypervisor.

C.

Security Engine.

D.

OS Kernal

Buy Now
Questions 25

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

Options:

A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.

Buy Now
Questions 26

Which of the following is NOT considered to be a form of computer misuse?

Options:

A.

Illegal retention of personal data.

B.

Illegal interception of information.

C.

Illegal access to computer systems.

D.

Downloading of pirated software.

Buy Now
Questions 27

What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?

Options:

A.

Privileged User Gateway

B.

Enterprise Security Management

C.

Multi Factor Authentication.

D.

Break Glass

Buy Now
Questions 28

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?

Options:

A.

Arson.

B.

Electromagnetic pulse

C.

Tsunami.

D.

Lightning Strike

Buy Now
Questions 29

Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.

What technology would be MOST beneficial to his organisation?

Options:

A.

VPN.

B.

IDS.

C.

MDM.

D.

SIEM.

Buy Now
Questions 30

How does network visualisation assist in managing information security?

Options:

A.

Visualisation can communicate large amounts of data in a manner that is a relatively simple way for people to analyse and interpret.

B.

Visualisation provides structured tables and lists that can be analysed using common tools such as MS Excel.

C.

Visualisation offers unstructured data that records the entirety of the data in a flat, filterable ftle format.

D.

Visualisation software operates in a way that is rarely and thereby it is less prone to malware infection.

Buy Now
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Nov 19, 2024
Questions: 100

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CISMP-V9 testing engine

PDF (Q&A)

$31.5  $104.99
buy now CISMP-V9 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 23 Nov 2024