Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISMP-V9 Exam Dumps - BCS Foundation Certificate in Information Security Management Principles V9.0

Question # 4

What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?

A.

Privileged User Gateway

B.

Enterprise Security Management

C.

Multi Factor Authentication.

D.

Break Glass

Full Access
Question # 5

When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?

A.

Spear Phishing.

B.

Shoulder Surfing.

C.

Dumpster Diving.

D.

Tailgating.

Full Access
Question # 6

Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?

A.

Data Deletion.

B.

Data Archiving.

C.

Data Storage.

D.

Data Publication

Full Access
Question # 7

What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?

A.

Red Team Training.

B.

Blue Team Training.

C.

Black Hat Training.

D.

Awareness Training.

Full Access
Question # 8

In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?

A.

Once defined, they do not need reviewing.

B.

A maximum of once every other month.

C.

When the next risk audit is due.

D.

Risks remain under constant review.

Full Access
Question # 9

Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?

A.

ITIL.

B.

SABSA.

C.

COBIT

D.

ISAGA.

Full Access
Question # 10

Which membership based organisation produces international standards, which cover good practice for information assurance?

A.

BSI.

B.

IETF.

C.

OWASP.

D.

ISF.

Full Access
Question # 11

What Is the PRIMARY reason for organisations obtaining outsourced managed security services?

A.

Managed security services permit organisations to absolve themselves of responsibility for security.

B.

Managed security services are a de facto requirement for certification to core security standards such as ISG/IEC 27001

C.

Managed security services provide access to specialist security tools and expertise on a shared, cost-effective basis.

D.

Managed security services are a powerful defence against litigation in the event of a security breach or incident

Full Access
Question # 12

When securing a wireless network, which of the following is NOT best practice?

A.

Using WPA encryption on the wireless network.

B.

Use MAC tittering on a SOHO network with a smart group of clients.

C.

Dedicating an access point on a dedicated VLAN connected to a firewall.

D.

Turning on SSID broadcasts to advertise security levels.

Full Access
Question # 13

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

A.

Risk = Likelihood * Impact.

B.

Risk = Likelihood / Impact.

C.

Risk = Vulnerability / Threat.

D.

Risk = Threat * Likelihood.

Full Access
Question # 14

What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?

A.

Code of Ethics.

B.

Security Culture.

C.

System Operating Procedures.

D.

Security Policy Framework.

Full Access
Question # 15

What does a penetration test do that a Vulnerability Scan does NOT?

A.

A penetration test seeks to actively exploit any known or discovered vulnerabilities.

B.

A penetration test looks for known vulnerabilities and reports them without further action.

C.

A penetration test is always an automated process - a vulnerability scan never is.

D.

A penetration test never uses common tools such as Nrnap, Nessus and Metasploit.

Full Access
Question # 16

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?

A.

Arson.

B.

Electromagnetic pulse

C.

Tsunami.

D.

Lightning Strike

Full Access
Question # 17

What type of attack could directly affect the confidentiality of an unencrypted VoIP network?

A.

Packet Sniffing.

B.

Brute Force Attack.

C.

Ransomware.

D.

Vishing Attack

Full Access
Question # 18

Which algorithm is a current specification for the encryption of electronic data established by NIST?

A.

RSA.

B.

AES.

C.

DES.

D.

PGP.

Full Access
Question # 19

James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.

What type of software programme is this?

A.

Free Source.

B.

Proprietary Source.

C.

Interpreted Source.

D.

Open Source.

Full Access
Question # 20

Which of the following is NOT an accepted classification of security controls?

A.

Nominative.

B.

Preventive.

C.

Detective.

D.

Corrective.

Full Access
Question # 21

Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?

A.

Advanced Persistent Threat.

B.

Trojan.

C.

Stealthware.

D.

Zero-day.

Full Access
Question # 22

In software engineering, what does 'Security by Design” mean?

A.

Low Level and High Level Security Designs are restricted in distribution.

B.

All security software artefacts are subject to a code-checking regime.

C.

The software has been designed from its inception to be secure.

D.

All code meets the technical requirements of GDPR.

Full Access
Question # 23

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?

A.

TOGAF

B.

SABSA

C.

PCI DSS.

D.

OWASP.

Full Access
Question # 24

Which of the following is an accepted strategic option for dealing with risk?

A.

Correction.

B.

Detection.

C.

Forbearance.

D.

Acceptance

Full Access
Question # 25

What Is the root cause as to why SMS messages are open to attackers and abuse?

A.

The store and forward nature of SMS means it is considered a 'fire and forget service'.

B.

SMS technology was never intended to be used to transmit high risk content such as One-time payment codes.

C.

The vast majority of mobile phones globally support the SMS protocol inexpensively.

D.

There are only two mobile phone platforms - Android and iOS - reducing the number of target environments.

Full Access
Question # 26

Why is it prudent for Third Parties to be contracted to meet specific security standards?

A.

Vulnerabilities in Third Party networks can be malevolently leveraged to gain illicit access into client environments.

B.

It is a legal requirement for Third Party support companies to meet client security standards.

C.

All access to corporate systems must be controlled via a single set of rules if they are to be enforceable.

D.

Third Parties cannot connect to other sites and networks without a contract of similar legal agreement.

Full Access
Question # 27

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.

Full Access
Question # 28

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?

A.

ISO/IEC 27001.

B.

Qualitative.

C.

CPNI.

D.

Quantitative

Full Access
Question # 29

Which of the following is NOT a valid statement to include in an organisation's security policy?

A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Full Access
Question # 30

Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?

A.

Professional qualification bodies demand CPD.

B.

Information Security changes constantly and at speed.

C.

IT certifications require CPD and Security needs to remain credible.

D.

CPD is a prerequisite of any Chartered Institution qualification.

Full Access