Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISMP-V9 Exam Dumps - BCS Information security and CCP scheme certifications Questions and Answers

Question # 4

What Is the first yet MOST simple and important action to take when setting up a new web server?

Options:

A.

Change default system passwords.

B.

Fully encrypt the hard disk.

C.

Apply hardening to all applications.

D.

Patch the OS to the latest version

Buy Now
Question # 5

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.

What system from the following does NOT natively support syslog events?

Options:

A.

Enterprise Wireless Access Point.

B.

Windows Desktop Systems.

C.

Linux Web Server Appliances.

D.

Enterprise Stateful Firewall.

Buy Now
Question # 6

Which algorithm is a current specification for the encryption of electronic data established by NIST?

Options:

A.

RSA.

B.

AES.

C.

DES.

D.

PGP.

Buy Now
Question # 7

What Is the PRIMARY difference between DevOps and DevSecOps?

Options:

A.

Within DevSecOps security is introduced at the end of development immediately prior to deployment.

B.

DevSecOps focuses solely on iterative development cycles.

C.

DevSecOps includes security on the same level as continuous integration and delivery.

D.

DevOps mandates that security is integrated at the beginning of the development lifecycle.

Buy Now
Question # 8

James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.

What type of software programme is this?

Options:

A.

Free Source.

B.

Proprietary Source.

C.

Interpreted Source.

D.

Open Source.

Buy Now
Question # 9

Why might the reporting of security incidents that involve personal data differ from other types of security incident?

Options:

A.

Personal data is not highly transient so its 1 investigation rarely involves the preservation of volatile memory and full forensic digital investigation.

B.

Personal data is normally handled on both IT and non-IT systems so such incidents need to be managed in two streams.

C.

Data Protection legislation normally requires the reporting of incidents involving personal data to a Supervisory Authority.

D.

Data Protection legislation is process-oriented and focuses on quality assurance of procedures and governance rather than data-focused event investigation

Buy Now
Question # 10

What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?

Options:

A.

Whaling.

B.

Spear-phishing.

C.

C-suite spamming.

D.

Trawling.

Buy Now
Question # 11

In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?

Options:

A.

Recorder.

B.

Desk secretary.

C.

Scribe.

D.

Scrum Master.

Buy Now
Question # 12

When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?

Options:

A.

Remove power from all digital devices at the scene to stop the data changing.

B.

Photograph all evidence and triage to determine whether live data capture is necessary.

C.

Remove all digital evidence from the scene to prevent unintentional damage.

D.

Don't touch any evidence until a senior digital investigator arrives.

Buy Now
Question # 13

When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?

1 Third party is competent to process the data securely.

2. Observes the same high standards as data owner.

3. Processes the data wherever the data can be transferred.

4. Archive the data for long term third party's own usage.

Options:

A.

2 and 3.

B.

3 and 4.

C.

1 and 4.

D.

1 and 2.

Buy Now
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Feb 24, 2025
Questions: 100
CISMP-V9 pdf

CISMP-V9 PDF

$25.5  $84.99
CISMP-V9 Engine

CISMP-V9 Testing Engine

$28.5  $94.99
CISMP-V9 PDF + Engine

CISMP-V9 PDF + Testing Engine

$40.5  $134.99