Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISMP-V9 Exam Dumps - BCS Foundation Certificate in Information Security Management Principles V9.0

Go to page:
Question # 25

What Is the root cause as to why SMS messages are open to attackers and abuse?

A.

The store and forward nature of SMS means it is considered a 'fire and forget service'.

B.

SMS technology was never intended to be used to transmit high risk content such as One-time payment codes.

C.

The vast majority of mobile phones globally support the SMS protocol inexpensively.

D.

There are only two mobile phone platforms - Android and iOS - reducing the number of target environments.

Full Access
Question # 26

Why is it prudent for Third Parties to be contracted to meet specific security standards?

A.

Vulnerabilities in Third Party networks can be malevolently leveraged to gain illicit access into client environments.

B.

It is a legal requirement for Third Party support companies to meet client security standards.

C.

All access to corporate systems must be controlled via a single set of rules if they are to be enforceable.

D.

Third Parties cannot connect to other sites and networks without a contract of similar legal agreement.

Full Access
Question # 27

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.

Full Access
Question # 28

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?

A.

ISO/IEC 27001.

B.

Qualitative.

C.

CPNI.

D.

Quantitative

Full Access
Question # 29

Which of the following is NOT a valid statement to include in an organisation's security policy?

A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Full Access
Question # 30

Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?

A.

Professional qualification bodies demand CPD.

B.

Information Security changes constantly and at speed.

C.

IT certifications require CPD and Security needs to remain credible.

D.

CPD is a prerequisite of any Chartered Institution qualification.

Full Access
Go to page: