Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISMP-V9 Exam Dumps - BCS Information security and CCP scheme certifications Questions and Answers

Question # 24

What Is the PRIMARY reason for organisations obtaining outsourced managed security services?

Options:

A.

Managed security services permit organisations to absolve themselves of responsibility for security.

B.

Managed security services are a de facto requirement for certification to core security standards such as ISG/IEC 27001

C.

Managed security services provide access to specialist security tools and expertise on a shared, cost-effective basis.

D.

Managed security services are a powerful defence against litigation in the event of a security breach or incident

Buy Now
Question # 25

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

Options:

A.

Risk = Likelihood * Impact.

B.

Risk = Likelihood / Impact.

C.

Risk = Vulnerability / Threat.

D.

Risk = Threat * Likelihood.

Buy Now
Question # 26

Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?

Options:

A.

Advanced Persistent Threat.

B.

Trojan.

C.

Stealthware.

D.

Zero-day.

Buy Now
Question # 27

Which three of the following characteristics form the AAA Triad in Information Security?

1. Authentication

2. Availability

3. Accounting

4. Asymmetry

5. Authorisation

Options:

A.

1, 2 and 3.

B.

2, 4, and 5.

C.

1, 3 and 4.

D.

1, 3 and 5.

Buy Now
Question # 28

How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?

Options:

A.

Password is better encrypted for system authentication.

B.

Access control logs are centrally located.

C.

Helps prevent the likelihood of users writing down passwords.

D.

Decreases the complexity of passwords users have to remember.

Buy Now
Question # 29

In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?

Options:

A.

The 'need to known principle.

B.

Verification of visitor's ID

C.

Appropriate behaviours.

D.

Access denial measures

Buy Now
Question # 30

Which of the following is NOT an information security specific vulnerability?

Options:

A.

Use of HTTP based Apache web server.

B.

Unpatched Windows operating system.

C.

Confidential data stored in a fire safe.

D.

Use of an unlocked filing cabinet.

Buy Now
Question # 31

In business continuity, what is a battle box?

Options:

A.

A portable container that holds Items and information useful in the event of an organisational disaster.

B.

An armoured box that holds all an organisation's backup databases.

C.

A collection of tools and protective equipment to be used in the event of civil disturbance.

D.

A list of names and addresses of staff to be utilised should industrial action prevent access to a building.

Buy Now
Question # 32

Which standard deals with the implementation of business continuity?

Options:

A.

ISO/IEC 27001

B.

COBIT

C.

IS0223G1.

D.

BS5750.

Buy Now
Question # 33

What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?

Options:

A.

End-to-end testing.

B.

Non-dynamic modeling

C.

Desk-top exercise.

D.

Fault stressing

Buy Now
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Feb 24, 2025
Questions: 100
CISMP-V9 pdf

CISMP-V9 PDF

$25.5  $84.99
CISMP-V9 Engine

CISMP-V9 Testing Engine

$28.5  $94.99
CISMP-V9 PDF + Engine

CISMP-V9 PDF + Testing Engine

$40.5  $134.99