Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

BCS CISMP-V9 - BCS Foundation Certificate in Information Security Management Principles V9.0

Page: 2 / 3
Total 100 questions

What Is the root cause as to why SMS messages are open to attackers and abuse?

A.

The store and forward nature of SMS means it is considered a 'fire and forget service'.

B.

SMS technology was never intended to be used to transmit high risk content such as One-time payment codes.

C.

The vast majority of mobile phones globally support the SMS protocol inexpensively.

D.

There are only two mobile phone platforms - Android and iOS - reducing the number of target environments.

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

A.

Generating and distributing spam messages.

B.

Conducting DDOS attacks.

C.

Scanning for system & application vulnerabilities.

D.

Undertaking vishing attacks

Which cryptographic protocol preceded Transport Layer Security (TLS)?

A.

Public Key Infrastructure (PKI).

B.

Simple Network Management Protocol (SNMP).

C.

Secure Sockets Layer (SSL).

D.

Hypertext Transfer Protocol Secure (HTTPS)

Which of the following statements relating to digital signatures is TRUE?

A.

Digital signatures are rarely legally enforceable even if the signers know they are signing a legal document.

B.

Digital signatures are valid and enforceable in law in most countries in the world.

C.

Digital signatures are legal unless there is a statutory requirement that predates the digital age.

D.

A digital signature that uses a signer’s private key is illegal.

A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.

What type of device has MOST LIKELY been discovered?

A.

File server.

B.

Printer.

C.

Firewall.

D.

Web server

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?

A.

ISO/IEC 27001.

B.

Qualitative.

C.

CPNI.

D.

Quantitative

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

A.

Task based access control.

B.

Role based access control.

C.

Rule based access control.

D.

Mandatory access control.

What Is the PRIMARY reason for organisations obtaining outsourced managed security services?

A.

Managed security services permit organisations to absolve themselves of responsibility for security.

B.

Managed security services are a de facto requirement for certification to core security standards such as ISG/IEC 27001

C.

Managed security services provide access to specialist security tools and expertise on a shared, cost-effective basis.

D.

Managed security services are a powerful defence against litigation in the event of a security breach or incident

The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.

Which of the below business practices does this statement define?

A.

Information Lifecycle Management.

B.

Information Quality Management.

C.

Total Quality Management.

D.

Business Continuity Management.

Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?

A.

Public.

B.

Private.

C.

Hybrid.

D.

Community