Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

BCS CISMP-V9 - BCS Foundation Certificate in Information Security Management Principles V9.0

Page: 3 / 3
Total 100 questions

Why should a loading bay NEVER be used as a staff entrance?

A.

Loading bays are intrinsically vulnerable, so minimising the people traffic makes securing the areas easier and more effective.

B.

Loading bays are often dirty places, and staff could find their clothing damaged or made less appropriate for the office.

C.

Most countries have specific legislation covering loading bays and breaching this could impact on insurance status.

D.

Staff should always enter a facility via a dedicated entrance to ensure smooth access and egress.

Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?

A.

A large increase in remote workers operating in insecure premises.

B.

Additional physical security requirements at data centres and corporate headquarters.

C.

Increased demand on service desks as users need additional tools such as VPNs.

D.

An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.

What system from the following does NOT natively support syslog events?

A.

Enterprise Wireless Access Point.

B.

Windows Desktop Systems.

C.

Linux Web Server Appliances.

D.

Enterprise Stateful Firewall.

In software engineering, what does 'Security by Design” mean?

A.

Low Level and High Level Security Designs are restricted in distribution.

B.

All security software artefacts are subject to a code-checking regime.

C.

The software has been designed from its inception to be secure.

D.

All code meets the technical requirements of GDPR.

In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?

A.

Guest Manager

B.

Hypervisor.

C.

Security Engine.

D.

OS Kernal

In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?

A.

Recorder.

B.

Desk secretary.

C.

Scribe.

D.

Scrum Master.

Which of the following is an accepted strategic option for dealing with risk?

A.

Correction.

B.

Detection.

C.

Forbearance.

D.

Acceptance

What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?

A.

End-to-end testing.

B.

Non-dynamic modeling

C.

Desk-top exercise.

D.

Fault stressing

You are undertaking a qualitative risk assessment of a likely security threat to an information system.

What is the MAIN issue with this type of risk assessment?

A.

These risk assessments are largely subjective and require agreement on rankings beforehand.

B.

Dealing with statistical and other numeric data can often be hard to interpret.

C.

There needs to be a large amount of previous data to "train" a qualitative risk methodology.

D.

It requires the use of complex software tools to undertake this risk assessment.

What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?

A.

Privileged User Gateway

B.

Enterprise Security Management

C.

Multi Factor Authentication.

D.

Break Glass