Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

BCS CISMP-V9 - BCS Foundation Certificate in Information Security Management Principles V9.0

Page: 1 / 3
Total 100 questions

What type of attack could directly affect the confidentiality of an unencrypted VoIP network?

A.

Packet Sniffing.

B.

Brute Force Attack.

C.

Ransomware.

D.

Vishing Attack

Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?

A.

ITIL.

B.

SABSA.

C.

COBIT

D.

ISAGA.

Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.

A.

Cryptographic Statement.

B.

Security Policy Framework.

C.

Acceptable Usage Policy.

D.

Business Continuity Plan.

Ensuring the correctness of data inputted to a system is an example of which facet of information security?

A.

Confidentiality.

B.

Integrity.

C.

Availability.

D.

Authenticity.

What does a penetration test do that a Vulnerability Scan does NOT?

A.

A penetration test seeks to actively exploit any known or discovered vulnerabilities.

B.

A penetration test looks for known vulnerabilities and reports them without further action.

C.

A penetration test is always an automated process - a vulnerability scan never is.

D.

A penetration test never uses common tools such as Nrnap, Nessus and Metasploit.

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

A.

System Integrity.

B.

Sandboxing.

C.

Intrusion Prevention System.

D.

Defence in depth.

Which of the following international standards deals with the retention of records?

A.

PCI DSS.

B.

RFC1918.

C.

IS015489.

D.

ISO/IEC 27002.

Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?

1. Intellectual Property Rights.

2. Protection of Organisational Records

3. Forensic recovery of data.

4. Data Deduplication.

5. Data Protection & Privacy.

A.

1, 2 and 3

B.

3, 4 and 5

C.

2, 3 and 4

D.

1, 2 and 5

What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?

A.

Threat trees.

B.

STRIDE charts.

C.

Misuse case diagrams.

D.

DREAD diagrams.

A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.

What technology SHOULD they adapt?

A.

TACACS+

B.

RADIUS.

C.

Oauth.

D.

MS Access Database.