Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISMP-V9 Exam Dumps - BCS Foundation Certificate in Information Security Management Principles V9.0

Go to page:
Question # 9

Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?

A.

ITIL.

B.

SABSA.

C.

COBIT

D.

ISAGA.

Full Access
Question # 10

Which membership based organisation produces international standards, which cover good practice for information assurance?

A.

BSI.

B.

IETF.

C.

OWASP.

D.

ISF.

Full Access
Question # 11

What Is the PRIMARY reason for organisations obtaining outsourced managed security services?

A.

Managed security services permit organisations to absolve themselves of responsibility for security.

B.

Managed security services are a de facto requirement for certification to core security standards such as ISG/IEC 27001

C.

Managed security services provide access to specialist security tools and expertise on a shared, cost-effective basis.

D.

Managed security services are a powerful defence against litigation in the event of a security breach or incident

Full Access
Question # 12

When securing a wireless network, which of the following is NOT best practice?

A.

Using WPA encryption on the wireless network.

B.

Use MAC tittering on a SOHO network with a smart group of clients.

C.

Dedicating an access point on a dedicated VLAN connected to a firewall.

D.

Turning on SSID broadcasts to advertise security levels.

Full Access
Question # 13

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

A.

Risk = Likelihood * Impact.

B.

Risk = Likelihood / Impact.

C.

Risk = Vulnerability / Threat.

D.

Risk = Threat * Likelihood.

Full Access
Question # 14

What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?

A.

Code of Ethics.

B.

Security Culture.

C.

System Operating Procedures.

D.

Security Policy Framework.

Full Access
Question # 15

What does a penetration test do that a Vulnerability Scan does NOT?

A.

A penetration test seeks to actively exploit any known or discovered vulnerabilities.

B.

A penetration test looks for known vulnerabilities and reports them without further action.

C.

A penetration test is always an automated process - a vulnerability scan never is.

D.

A penetration test never uses common tools such as Nrnap, Nessus and Metasploit.

Full Access
Question # 16

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?

A.

Arson.

B.

Electromagnetic pulse

C.

Tsunami.

D.

Lightning Strike

Full Access
Go to page: