BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Online Training
BCS CISMP-V9 Online Training
The questions for CISMP-V9 were last updated at Feb 03,2025.
- Exam Code: CISMP-V9
- Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
- Certification Provider: BCS
- Latest update: Feb 03,2025
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
- A . TOGAF
- B . SABSA
- C . PCI DSS.
- D . OWASP.
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
- A . Accountability.
- B . Responsibility.
- C . Credibility.
- D . Confidentiality.
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?
- A . Ensure they are competent to be able to do so and be able to justify their actions.
- B . Ensure they are being observed by a senior investigator in all actions.
- C . Ensure they do not handle the evidence as that mustbe done by law enforcement officers.
- D . Ensure the data has been adjusted to meet the investigation requirements.
Which of the following is NOT a valid statement to include in an organisation’s security policy?
- A . The policy has the support of Board and the Chief Executive.
- B . The policy has been agreed and amended to suit all third party contractors.
- C . How the organisation will manage information assurance.
- D . The compliance with legal and regulatory obligations.
Which of the following is NOT considered to be a form of computer misuse?
- A . Illegal retention of personal data.
- B . Illegal interception of information.
- C . Illegal access to computer systems.
- D . Downloading of pirated software.
What Is the PRIMARY reason for organisations obtaining outsourced managed security services?
- A . Managed security services permit organisations to absolve themselves of responsibility for security.
- B . Managed security services are a de facto requirement for certification to core security standards such as ISG/IEC 27001
- C . Managed security services provide access to specialist security tools and expertiseon a shared, cost-effective basis.
- D . Managed security services are a powerful defence against litigation in the event of a security breach or incident
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
- A . The ‘need to knownprinciple.
- B . Verification of visitor’s ID
- C . Appropriate behaviours.
- D . Access denial measures
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
- A . Advanced Persistent Threat.
- B . Trojan.
- C . Stealthware.
- D . Zero-day.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- A . System Integrity.
- B . Sandboxing.
- C . Intrusion Prevention System.
- D . Defence in depth.