BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Online Training
BCS CISMP-V9 Online Training
The questions for CISMP-V9 were last updated at Nov 19,2024.
- Exam Code: CISMP-V9
- Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
- Certification Provider: BCS
- Latest update: Nov 19,2024
What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?
- A . Faraday cage.
- B . Unshielded cabling.
- C . Copper infused windows.
- D . White noise generation.
In software engineering, what does ‘Security by Design”mean?
- A . Low Level and High Level Security Designs are restricted in distribution.
- B . All security software artefacts are subject to a code-checking regime.
- C . The software has been designed from its inception to be secure.
- D . All code meets the technical requirements of GDPR.
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD)within the Information Securitysphere?
- A . Professional qualification bodies demand CPD.
- B . Information Security changes constantly and at speed.
- C . IT certifications require CPD and Security needs to remain credible.
- D . CPD is a prerequisite of any Chartered Institution qualification.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
- A . Red Team Training.
- B . Blue Team Training.
- C . Black Hat Training.
- D . Awareness Training.
What advantage does the delivery of online security training material have over the distribution of printed media?
- A . Updating online material requires a single edit. Printed material needs to be distributed physically.
- B . Online training material is intrinsically more accurate than printed material.
- C . Printed material is a ‘discoverable record’ and could expose the organisation to litigation in the event of an incident.
- D . Online material is protected by international digital copyright legislation across most territories.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
- A . Under the European Convention of Human Rights, the interception of telecommunications represents aninterference with the right toprivacy.
- B . GDPR overrides all previous legislation on information handling, so new laws were needed to ensure authorities did not inadvertentlybreak the law.
- C . Police could previously intercept without lawful authority any communications in the course of transmission through a public post ortelecoms system.
- D . Surveillance of a conversation or an online message by law enforcement agents was previously illegaldue to the 1950 version of the Human Rights Convention.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
- A . RSA.
- B . AES.
- C . DES.
- D . PGP.
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
- A . Risk = Likelihood * Impact.
- B . Risk = Likelihood / Impact.
- C . Risk = Vulnerability / Threat.
- D . Risk = Threat * Likelihood.
In a security governance framework, which of the following publications would be at the HIGHEST level?
- A . Procedures.
- B . Standards
- C . Policy.
- D . Guidelines
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
- A . Quality Assurance and Control
- B . Dynamic verification.
- C . Static verification.
- D . Source code analysis.