BCS CISMP-V9 - BCS Foundation Certificate in Information Security Management Principles V9.0
What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
What does a penetration test do that a Vulnerability Scan does NOT?
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Which of the following international standards deals with the retention of records?
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?