CISMP-V9 Practice Questions
BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update 4 days ago
Total Questions : 100
Dive into our fully updated and stable CISMP-V9 practice test platform, featuring all the latest Information security and CCP scheme certifications exam questions added this week. Our preparation tool is more than just a BCS study aid; it's a strategic advantage.
Our free Information security and CCP scheme certifications practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISMP-V9. Use this test to pinpoint which areas you need to focus your study on.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
