Vcehome > BCS > Information security and CCP scheme certifications > CISMP-V9 > CISMP-V9 Online Practice Questions and Answers

CISMP-V9 Online Practice Questions and Answers

Questions 4

In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?

A. Appointment of a Chief Information Security Officer (CISO).

B. Purchasing all senior executives personal firewalls.

C. Adopting an organisation wide "clear desk" policy.

D. Developing a security awareness e-learning course.

Browse 100 Q&As
Questions 5

Which standard deals with the implementation of business continuity?

A. ISO/IEC 27001

B. COBIT

C. IS0223G1.

D. BS5750.

Browse 100 Q&As
Questions 6

What does a penetration test do that a Vulnerability Scan does NOT?

A. A penetration test seeks to actively exploit any known or discovered vulnerabilities.

B. A penetration test looks for known vulnerabilities and reports them without further action.

C. A penetration test is always an automated process - a vulnerability scan never is.

D. A penetration test never uses common tools such as Nrnap, Nessus and Metasploit.

Browse 100 Q&As
Questions 7

Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?

A. Professional qualification bodies demand CPD.

B. Information Security changes constantly and at speed.

C. IT certifications require CPD and Security needs to remain credible.

D. CPD is a prerequisite of any Chartered Institution qualification.

Browse 100 Q&As
Questions 8

When an organisation decides to operate on the public cloud, what does it lose?

A. The right to audit and monitor access to its information.

B. Control over Intellectual Property Rights relating to its applications.

C. Physical access to the servers hosting its information.

D. The ability to determine in which geographies the information is stored.

Browse 100 Q&As
Questions 9

Ensuring the correctness of data inputted to a system is an example of which facet of information security?

A. Confidentiality.

B. Integrity.

C. Availability.

D. Authenticity.

Browse 100 Q&As
Questions 10

Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?

A. Strong OS patch management

B. Vulnerability assessment

C. Signature-based intrusion detection.

D. Anomaly based intrusion detection.

Browse 100 Q&As
Questions 11

When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?

A. Spear Phishing.

B. Shoulder Surfing.

C. Dumpster Diving.

D. Tailgating.

Browse 100 Q&As
Questions 12

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?

A. Arson.

B. Electromagnetic pulse

C. Tsunami.

D. Lightning Strike

Browse 100 Q&As
Questions 13

Which algorithm is a current specification for the encryption of electronic data established by NIST?

A. RSA.

B. AES.

C. DES.

D. PGP.

Browse 100 Q&As
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: May 10, 2024
Questions: 100 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99