BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update May 17, 2024
Total Questions : 100
We are offering FREE CISMP-V9 BCS exam questions. All you do is to just go and sign up. Give your details, prepare CISMP-V9 free exam questions and then go for complete pool of BCS Foundation Certificate in Information Security Management Principles V9.0 test questions that will help you more.
Which of the following is MOST LIKELY to be described as a consequential loss?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Which membership based organisation produces international standards, which cover good practice for information assurance?
When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?
When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?
What Is the root cause as to why SMS messages are open to attackers and abuse?
Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
Which of the following international standards deals with the retention of records?
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
What Is the first yet MOST simple and important action to take when setting up a new web server?
Which of the following is NOT an information security specific vulnerability?
For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?