Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISMP-V9 Exam Dumps - BCS Information security and CCP scheme certifications Questions and Answers

Question # 14

Which of the following is NOT an accepted classification of security controls?

Options:

A.

Nominative.

B.

Preventive.

C.

Detective.

D.

Corrective.

Buy Now
Question # 15

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

Options:

A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.

Buy Now
Question # 16

Which of the following is MOST LIKELY to be described as a consequential loss?

Options:

A.

Reputation damage.

B.

Monetary theft.

C.

Service disruption.

D.

Processing errors.

Buy Now
Question # 17

Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?

Options:

A.

Under the European Convention of Human Rights, the interception of telecommunications represents an interference with the right to privacy.

B.

GDPR overrides all previous legislation on information handling, so new laws were needed to ensure authorities did not inadvertently break the law.

C.

Police could previously intercept without lawful authority any communications in the course of transmission through a public post or telecoms system.

D.

Surveillance of a conversation or an online message by law enforcement agents was previously illegal due to the 1950 version of the Human Rights Convention.

Buy Now
Question # 18

Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?

Options:

A.

A large increase in remote workers operating in insecure premises.

B.

Additional physical security requirements at data centres and corporate headquarters.

C.

Increased demand on service desks as users need additional tools such as VPNs.

D.

An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.

Buy Now
Question # 19

When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?

Options:

A.

Digital evidence must not be altered unless absolutely necessary.

B.

Acquiring digital evidence cart only be carried on digital devices which have been turned off.

C.

Digital evidence can only be handled by a member of law enforcement.

D.

Digital devices must be forensically "clean" before investigation.

Buy Now
Question # 20

Which types of organisations are likely to be the target of DDoS attacks?

Options:

A.

Cloud service providers.

B.

Any financial sector organisations.

C.

Online retail based organisations.

D.

Any organisation with an online presence.

Buy Now
Question # 21

Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?

Options:

A.

Public.

B.

Private.

C.

Hybrid.

D.

Community

Buy Now
Question # 22

What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?

Options:

A.

Code of Ethics.

B.

Security Culture.

C.

System Operating Procedures.

D.

Security Policy Framework.

Buy Now
Question # 23

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

Options:

A.

Generating and distributing spam messages.

B.

Conducting DDOS attacks.

C.

Scanning for system & application vulnerabilities.

D.

Undertaking vishing attacks

Buy Now
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Feb 24, 2025
Questions: 100
CISMP-V9 pdf

CISMP-V9 PDF

$25.5  $84.99
CISMP-V9 Engine

CISMP-V9 Testing Engine

$28.5  $94.99
CISMP-V9 PDF + Engine

CISMP-V9 PDF + Testing Engine

$40.5  $134.99