Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 is now Stable and With Pass Result | Test Your Knowledge for Free

CISMP-V9 Practice Questions

BCS Foundation Certificate in Information Security Management Principles V9.0

Last Update 4 days ago
Total Questions : 100

Dive into our fully updated and stable CISMP-V9 practice test platform, featuring all the latest Information security and CCP scheme certifications exam questions added this week. Our preparation tool is more than just a BCS study aid; it's a strategic advantage.

Our free Information security and CCP scheme certifications practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISMP-V9. Use this test to pinpoint which areas you need to focus your study on.

CISMP-V9 PDF

CISMP-V9 PDF (Printable)
$43.75
$124.99

CISMP-V9 Testing Engine

CISMP-V9 PDF (Printable)
$50.75
$144.99

CISMP-V9 PDF + Testing Engine

CISMP-V9 PDF (Printable)
$63.7
$181.99
Question # 11

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

Options:

A.  

Risk = Likelihood * Impact.

B.  

Risk = Likelihood / Impact.

C.  

Risk = Vulnerability / Threat.

D.  

Risk = Threat * Likelihood.

Discussion 0
Question # 12

For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?

Options:

A.  

To reduce the chance of collusion between security staff and those being monitored.

B.  

To give experience to monitoring staff across a range of activities for training purposes.

C.  

Health and Safety regulations demand that staff are rotated to prevent posture and vision related harm.

D.  

The human attention span during intense monitoring sessions is about 20 minutes.

Discussion 0
Question # 13

How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?

Options:

A.  

Password is better encrypted for system authentication.

B.  

Access control logs are centrally located.

C.  

Helps prevent the likelihood of users writing down passwords.

D.  

Decreases the complexity of passwords users have to remember.

Discussion 0
Question # 14

What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?

Options:

A.  

Red Team Training.

B.  

Blue Team Training.

C.  

Black Hat Training.

D.  

Awareness Training.

Discussion 0
Question # 15

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.

What system from the following does NOT natively support syslog events?

Options:

A.  

Enterprise Wireless Access Point.

B.  

Windows Desktop Systems.

C.  

Linux Web Server Appliances.

D.  

Enterprise Stateful Firewall.

Discussion 0
Question # 16

Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?

Options:

A.  

Cold site.

B.  

Warm site.

C.  

Hot site.

D.  

Spare site

Discussion 0
Question # 17

Which algorithm is a current specification for the encryption of electronic data established by NIST?

Options:

A.  

RS

A.  

B.  

AES.

C.  

DES.

D.  

PGP.

Discussion 0
Question # 18

What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?

Options:

A.  

Privileged User Gateway

B.  

Enterprise Security Management

C.  

Multi Factor Authentication.

D.  

Break Glass

Discussion 0
Question # 19

How might the effectiveness of a security awareness program be effectively measured?

1) Employees are required to take an online multiple choice exam on security principles.

2) Employees are tested with social engineering techniques by an approved penetration tester.

3) Employees practice ethical hacking techniques on organisation systems.

4) No security vulnerabilities are reported during an audit.

5) Open source intelligence gathering is undertaken on staff social media profiles.

Options:

A.  

3, 4 and 5.

B.  

2, 4 and 5.

C.  

1, 2 and 3.

D.  

1, 2 and 5.

Discussion 0
Question # 20

What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?

Options:

A.  

Code of Ethics.

B.  

Security Culture.

C.  

System Operating Procedures.

D.  

Security Policy Framework.

Discussion 0
Get CISMP-V9 dumps and pass your exam in 24 hours!

Free Exams Sample Questions