Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 is now Stable and With Pass Result | Test Your Knowledge for Free

CISMP-V9 Practice Questions

BCS Foundation Certificate in Information Security Management Principles V9.0

Last Update 4 days ago
Total Questions : 100

Dive into our fully updated and stable CISMP-V9 practice test platform, featuring all the latest Information security and CCP scheme certifications exam questions added this week. Our preparation tool is more than just a BCS study aid; it's a strategic advantage.

Our free Information security and CCP scheme certifications practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISMP-V9. Use this test to pinpoint which areas you need to focus your study on.

CISMP-V9 PDF

CISMP-V9 PDF (Printable)
$43.75
$124.99

CISMP-V9 Testing Engine

CISMP-V9 PDF (Printable)
$50.75
$144.99

CISMP-V9 PDF + Testing Engine

CISMP-V9 PDF (Printable)
$63.7
$181.99
Question # 21

Which three of the following characteristics form the AAA Triad in Information Security?

1. Authentication

2. Availability

3. Accounting

4. Asymmetry

5. Authorisation

Options:

A.  

1, 2 and 3.

B.  

2, 4, and 5.

C.  

1, 3 and 4.

D.  

1, 3 and 5.

Discussion 0
Question # 22

In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?

Options:

A.  

Guest Manager

B.  

Hypervisor.

C.  

Security Engine.

D.  

OS Kernal

Discussion 0
Question # 23

A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.

What technology SHOULD they adapt?

Options:

A.  

TACACS+

B.  

RADIUS.

C.  

Oauth.

D.  

MS Access Database.

Discussion 0
Question # 24

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

Options:

A.  

Generating and distributing spam messages.

B.  

Conducting DDOS attacks.

C.  

Scanning for system & application vulnerabilities.

D.  

Undertaking vishing attacks

Discussion 0
Question # 25

In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?

Options:

A.  

Recorder.

B.  

Desk secretary.

C.  

Scribe.

D.  

Scrum Master.

Discussion 0
Question # 26

According to ISO/IEC 27000, which of the following is the definition of a vulnerability?

Options:

A.  

A weakness of an asset or group of assets that can be exploited by one or more threats.

B.  

The impact of a cyber attack on an asset or group of assets.

C.  

The threat that an asset or group of assets may be damaged by an exploit.

D.  

The damage that has been caused by a weakness iin a system.

Discussion 0
Question # 27

You are undertaking a qualitative risk assessment of a likely security threat to an information system.

What is the MAIN issue with this type of risk assessment?

Options:

A.  

These risk assessments are largely subjective and require agreement on rankings beforehand.

B.  

Dealing with statistical and other numeric data can often be hard to interpret.

C.  

There needs to be a large amount of previous data to "train" a qualitative risk methodology.

D.  

It requires the use of complex software tools to undertake this risk assessment.

Discussion 0
Question # 28

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

Options:

A.  

Task based access control.

B.  

Role based access control.

C.  

Rule based access control.

D.  

Mandatory access control.

Discussion 0
Question # 29

When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?

1 Third party is competent to process the data securely.

2. Observes the same high standards as data owner.

3. Processes the data wherever the data can be transferred.

4. Archive the data for long term third party's own usage.

Options:

A.  

2 and 3.

B.  

3 and 4.

C.  

1 and 4.

D.  

1 and 2.

Discussion 0
Question # 30

Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?

Options:

A.  

ITIL.

B.  

SABS

A.  

C.  

COBIT

D.  

ISAG

A.  

Discussion 0
Get CISMP-V9 dumps and pass your exam in 24 hours!

Free Exams Sample Questions