Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISMP-V9 Exam Dumps - BCS Foundation Certificate in Information Security Management Principles V9.0

Go to page:
Question # 17

What type of attack could directly affect the confidentiality of an unencrypted VoIP network?

A.

Packet Sniffing.

B.

Brute Force Attack.

C.

Ransomware.

D.

Vishing Attack

Full Access
Question # 18

Which algorithm is a current specification for the encryption of electronic data established by NIST?

A.

RSA.

B.

AES.

C.

DES.

D.

PGP.

Full Access
Question # 19

James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.

What type of software programme is this?

A.

Free Source.

B.

Proprietary Source.

C.

Interpreted Source.

D.

Open Source.

Full Access
Question # 20

Which of the following is NOT an accepted classification of security controls?

A.

Nominative.

B.

Preventive.

C.

Detective.

D.

Corrective.

Full Access
Question # 21

Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?

A.

Advanced Persistent Threat.

B.

Trojan.

C.

Stealthware.

D.

Zero-day.

Full Access
Question # 22

In software engineering, what does 'Security by Design” mean?

A.

Low Level and High Level Security Designs are restricted in distribution.

B.

All security software artefacts are subject to a code-checking regime.

C.

The software has been designed from its inception to be secure.

D.

All code meets the technical requirements of GDPR.

Full Access
Question # 23

Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?

A.

TOGAF

B.

SABSA

C.

PCI DSS.

D.

OWASP.

Full Access
Question # 24

Which of the following is an accepted strategic option for dealing with risk?

A.

Correction.

B.

Detection.

C.

Forbearance.

D.

Acceptance

Full Access
Go to page: