Pass4itsure > BCS > Information security and CCP scheme certifications > CISMP-V9 > CISMP-V9 Online Practice Questions and Answers

CISMP-V9 Online Practice Questions and Answers

Questions 4

Which types of organisations are likely to be the target of DDoS attacks?

A. Cloud service providers.

B. Any financial sector organisations.

C. Online retail based organisations.

D. Any organisation with an online presence.

Buy Now
Questions 5

Which of the following describes a qualitative risk assessment approach?

A. A subjective assessment of risk occurrence likelihood against the potential impact that determines the overall severity of a risk.

B. The use of verifiable data to predict the risk occurrence likelihood and the potential impact so as to determine the overall severity of a risk.

C. The use of Monte-Carlo Analysis and Layers of Protection Analysis (LOPA) to determine the overall severity of a risk.

D. The use of Risk Tolerance and Risk Appetite values to determine the overall severity of a risk

Buy Now
Questions 6

Which of the following is an accepted strategic option for dealing with risk?

A. Correction.

B. Detection.

C. Forbearance.

D. Acceptance

Buy Now
Questions 7

Which of the following is NOT a valid statement to include in an organisation's security policy?

A. The policy has the support of Board and the Chief Executive.

B. The policy has been agreed and amended to suit all third party contractors.

C. How the organisation will manage information assurance.

D. The compliance with legal and regulatory obligations.

Buy Now
Questions 8

In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?

A. Appointment of a Chief Information Security Officer (CISO).

B. Purchasing all senior executives personal firewalls.

C. Adopting an organisation wide "clear desk" policy.

D. Developing a security awareness e-learning course.

Buy Now
Questions 9

What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?

A. Red Team Training.

B. Blue Team Training.

C. Black Hat Training.

D. Awareness Training.

Buy Now
Questions 10

What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?

A. XSS.

B. Parameter Tampering

C. SQL Injection.

D. CSRF.

Buy Now
Questions 11

A penetration tester undertaking a port scan of a client's network, discovers a host which responds to

requests on TCP ports 22, 80, 443, 3306 and 8080.

What type of device has MOST LIKELY been discovered?

A. File server.

B. Printer.

C. Firewall.

D. Web server

Buy Now
Questions 12

When an organisation decides to operate on the public cloud, what does it lose?

A. The right to audit and monitor access to its information.

B. Control over Intellectual Property Rights relating to its applications.

C. Physical access to the servers hosting its information.

D. The ability to determine in which geographies the information is stored.

Buy Now
Questions 13

Which of the following is an asymmetric encryption algorithm?

A. DES.

B. AES.

C. ATM.

D. RSA.

Buy Now
Exam Code: CISMP-V9
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Apr 26, 2024
Questions: 100
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99