BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Online Training
BCS CISMP-V9 Online Training
The questions for CISMP-V9 were last updated at Feb 03,2025.
- Exam Code: CISMP-V9
- Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
- Certification Provider: BCS
- Latest update: Feb 03,2025
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- A . System Integrity.
- B . Sandboxing.
- C . Intrusion Prevention System.
- D . Defence in depth.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- A . System Integrity.
- B . Sandboxing.
- C . Intrusion Prevention System.
- D . Defence in depth.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- A . System Integrity.
- B . Sandboxing.
- C . Intrusion Prevention System.
- D . Defence in depth.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- A . System Integrity.
- B . Sandboxing.
- C . Intrusion Prevention System.
- D . Defence in depth.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- A . System Integrity.
- B . Sandboxing.
- C . Intrusion Prevention System.
- D . Defence in depth.
Data Protection & Privacy.
- A . 1, 2 and 3
- B . 3, 4 and 5
- C . 2, 3 and 4
- D . 1, 2 and 5
Which of the following controls would be the MOST relevant and effective in detecting zero
day attacks?
- A . Strong OS patch management
- B . Vulnerability assessment
- C . Signature-based intrusion detection.
- D . Anomaly based intrusion detection.
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
- A . ISO/IEC 27001.
- B . Qualitative.
- C . CPNI.
- D . Quantitative
Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?
- A . Public.
- B . Private.
- C . Hybrid.
- D . Community
Which of the following is MOST LIKELY to be described as a consequential loss?
- A . Reputation damage.
- B . Monetary theft.
- C . Service disruption.
- D . Processing errors.