New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Questions and Answers

Questions 4

What type of attack could directly affect the confidentiality of an unencrypted VoIP network?

Options:

A.

Packet Sniffing.

B.

Brute Force Attack.

C.

Ransomware.

D.

Vishing Attack

Buy Now
Questions 5

Which of the following describes a qualitative risk assessment approach?

Options:

A.

A subjective assessment of risk occurrence likelihood against the potential impact that determines the overall severity of a risk.

B.

The use of verifiable data to predict the risk occurrence likelihood and the potential impact so as to determine the overall severity of a risk.

C.

The use of Monte-Carlo Analysis and Layers of Protection Analysis (LOPA) to determine the overall severity of a risk.

D.

The use of Risk Tolerance and Risk Appetite values to determine the overall severity of a risk

Buy Now
Questions 6

In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?

Options:

A.

The 'need to known principle.

B.

Verification of visitor's ID

C.

Appropriate behaviours.

D.

Access denial measures

Buy Now
Questions 7

Which of the following is NOT an accepted classification of security controls?

Options:

A.

Nominative.

B.

Preventive.

C.

Detective.

D.

Corrective.

Buy Now
Questions 8

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

Options:

A.

Task based access control.

B.

Role based access control.

C.

Rule based access control.

D.

Mandatory access control.

Buy Now
Questions 9

What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?

Options:

A.

Brute Force Attack.

B.

Social Engineering.

C.

Ransomware.

D.

Denial of Service.

Buy Now
Questions 10

You are undertaking a qualitative risk assessment of a likely security threat to an information system.

What is the MAIN issue with this type of risk assessment?

Options:

A.

These risk assessments are largely subjective and require agreement on rankings beforehand.

B.

Dealing with statistical and other numeric data can often be hard to interpret.

C.

There needs to be a large amount of previous data to "train" a qualitative risk methodology.

D.

It requires the use of complex software tools to undertake this risk assessment.

Buy Now
Questions 11

What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?

Options:

A.

Whaling.

B.

Spear-phishing.

C.

C-suite spamming.

D.

Trawling.

Buy Now
Questions 12

Which algorithm is a current specification for the encryption of electronic data established by NIST?

Options:

A.

RSA.

B.

AES.

C.

DES.

D.

PGP.

Buy Now
Questions 13

Which of the following is often the final stage in the information management lifecycle?

Options:

A.

Disposal.

B.

Creation.

C.

Use.

D.

Publication.

Buy Now
Questions 14

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

Options:

A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.

Buy Now
Questions 15

Which of the following is an asymmetric encryption algorithm?

Options:

A.

DES.

B.

AES.

C.

ATM.

D.

RSA.

Buy Now
Questions 16

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

Options:

A.

Generating and distributing spam messages.

B.

Conducting DDOS attacks.

C.

Scanning for system & application vulnerabilities.

D.

Undertaking vishing attacks

Buy Now
Questions 17

What Is the first yet MOST simple and important action to take when setting up a new web server?

Options:

A.

Change default system passwords.

B.

Fully encrypt the hard disk.

C.

Apply hardening to all applications.

D.

Patch the OS to the latest version

Buy Now
Questions 18

Why is it prudent for Third Parties to be contracted to meet specific security standards?

Options:

A.

Vulnerabilities in Third Party networks can be malevolently leveraged to gain illicit access into client environments.

B.

It is a legal requirement for Third Party support companies to meet client security standards.

C.

All access to corporate systems must be controlled via a single set of rules if they are to be enforceable.

D.

Third Parties cannot connect to other sites and networks without a contract of similar legal agreement.

Buy Now
Questions 19

Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?

Options:

A.

Data Deletion.

B.

Data Archiving.

C.

Data Storage.

D.

Data Publication

Buy Now
Questions 20

What Is the KEY purpose of appending security classification labels to information?

Options:

A.

To provide guidance and instruction on implementing appropriate security controls to protect the information.

B.

To comply with whatever mandatory security policy framework is in place within the geographical location in question.

C.

To ensure that should the information be lost in transit, it can be returned to the originator using the correct protocols.

D.

To make sure the correct colour-coding system is used when the information is ready for archive.

Buy Now
Questions 21

What advantage does the delivery of online security training material have over the distribution of printed media?

Options:

A.

Updating online material requires a single edit. Printed material needs to be distributed physically.

B.

Online training material is intrinsically more accurate than printed material.

C.

Printed material is a 'discoverable record' and could expose the organisation to litigation in the event of an incident.

D.

Online material is protected by international digital copyright legislation across most territories.

Buy Now
Questions 22

A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.

What type of device has MOST LIKELY been discovered?

Options:

A.

File server.

B.

Printer.

C.

Firewall.

D.

Web server

Buy Now
Questions 23

Which of the following is NOT an information security specific vulnerability?

Options:

A.

Use of HTTP based Apache web server.

B.

Unpatched Windows operating system.

C.

Confidential data stored in a fire safe.

D.

Use of an unlocked filing cabinet.

Buy Now
Questions 24

Which of the following is NOT a valid statement to include in an organisation's security policy?

Options:

A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Buy Now
Questions 25

In business continuity, what is a battle box?

Options:

A.

A portable container that holds Items and information useful in the event of an organisational disaster.

B.

An armoured box that holds all an organisation's backup databases.

C.

A collection of tools and protective equipment to be used in the event of civil disturbance.

D.

A list of names and addresses of staff to be utilised should industrial action prevent access to a building.

Buy Now
Questions 26

Which of the following statements relating to digital signatures is TRUE?

Options:

A.

Digital signatures are rarely legally enforceable even if the signers know they are signing a legal document.

B.

Digital signatures are valid and enforceable in law in most countries in the world.

C.

Digital signatures are legal unless there is a statutory requirement that predates the digital age.

D.

A digital signature that uses a signer’s private key is illegal.

Buy Now
Questions 27

What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?

Options:

A.

Segregation of Duties.

B.

Non-disclosure.

C.

Acceptable use policy.

D.

Security clearance.

Buy Now
Questions 28

What does a penetration test do that a Vulnerability Scan does NOT?

Options:

A.

A penetration test seeks to actively exploit any known or discovered vulnerabilities.

B.

A penetration test looks for known vulnerabilities and reports them without further action.

C.

A penetration test is always an automated process - a vulnerability scan never is.

D.

A penetration test never uses common tools such as Nrnap, Nessus and Metasploit.

Buy Now
Questions 29

What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?

Options:

A.

Threat trees.

B.

STRIDE charts.

C.

Misuse case diagrams.

D.

DREAD diagrams.

Buy Now
Questions 30

Which membership based organisation produces international standards, which cover good practice for information assurance?

Options:

A.

BSI.

B.

IETF.

C.

OWASP.

D.

ISF.

Buy Now
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Dec 22, 2024
Questions: 100

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99