Certbus > BCS > Information security and CCP scheme certifications > CISMP-V9 > CISMP-V9 Online Practice Questions and Answers

CISMP-V9 Online Practice Questions and Answers

Questions 4

Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?

A. A large increase in remote workers operating in insecure premises.

B. Additional physical security requirements at data centres and corporate headquarters.

C. Increased demand on service desks as users need additional tools such as VPNs.

D. An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.

Browse 100 Q&As
Questions 5

Which of the following is MOST LIKELY to be described as a consequential loss?

A. Reputation damage.

B. Monetary theft.

C. Service disruption.

D. Processing errors.

Browse 100 Q&As
Questions 6

Which of the following statements relating to digital signatures is TRUE?

A. Digital signatures are rarely legally enforceable even if the signers know they are signing a legal document.

B. Digital signatures are valid and enforceable in law in most countries in the world.

C. Digital signatures are legal unless there is a statutory requirement that predates the digital age.

D. A digital signature that uses a signer's private key is illegal.

Browse 100 Q&As
Questions 7

Which of the following is NOT considered to be a form of computer misuse?

A. Illegal retention of personal data.

B. Illegal interception of information.

C. Illegal access to computer systems.

D. Downloading of pirated software.

Browse 100 Q&As
Questions 8

Which of the following international standards deals with the retention of records?

A. PCI DSS.

B. RFC1918.

C. IS015489.

D. ISO/IEC 27002.

Browse 100 Q&As
Questions 9

Which of the following is often the final stage in the information management lifecycle?

A. Disposal.

B. Creation.

C. Use.

D. Publication.

Browse 100 Q&As
Questions 10

Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?

A. Data Deletion.

B. Data Archiving.

C. Data Storage.

D. Data Publication

Browse 100 Q&As
Questions 11

Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?

A. CERT

B. SIEM.

C. CISM.

D. DDoS.

Browse 100 Q&As
Questions 12

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

A. Task based access control.

B. Role based access control.

C. Rule based access control.

D. Mandatory access control.

Browse 100 Q&As
Questions 13

How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?

A. Password is better encrypted for system authentication.

B. Access control logs are centrally located.

C. Helps prevent the likelihood of users writing down passwords.

D. Decreases the complexity of passwords users have to remember.

Browse 100 Q&As
Questions 14

What advantage does the delivery of online security training material have over the distribution of printed media?

A. Updating online material requires a single edit. Printed material needs to be distributed physically.

B. Online training material is intrinsically more accurate than printed material.

C. Printed material is a 'discoverable record' and could expose the organisation to litigation in the event of an incident.

D. Online material is protected by international digital copyright legislation across most territories.

Browse 100 Q&As
Questions 15

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

A. Generating and distributing spam messages.

B. Conducting DDOS attacks.

C. Scanning for system and application vulnerabilities.

D. Undertaking vishing attacks

Browse 100 Q&As
Questions 16

What Is the first yet MOST simple and important action to take when setting up a new web server?

A. Change default system passwords.

B. Fully encrypt the hard disk.

C. Apply hardening to all applications.

D. Patch the OS to the latest version

Browse 100 Q&As
Questions 17

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog. What system from the following does NOT natively support syslog events?

A. Enterprise Wireless Access Point.

B. Windows Desktop Systems.

C. Linux Web Server Appliances.

D. Enterprise Stateful Firewall.

Browse 100 Q&As
Questions 18

Which of the following is an asymmetric encryption algorithm?

A. DES.

B. AES.

C. ATM.

D. RSA.

Browse 100 Q&As
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Apr 27, 2024
Questions: 100 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99