Pass the BCS Information security and CCP scheme certifications CISMP-V9 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?

Options:

A.

The 'need to known principle.


B.

Verification of visitor's ID


C.

Appropriate behaviours.


D.

Access denial measures


Expert Solution
Questions # 2:

What Is the PRIMARY difference between DevOps and DevSecOps?

Options:

A.

Within DevSecOps security is introduced at the end of development immediately prior to deployment.


B.

DevSecOps focuses solely on iterative development cycles.


C.

DevSecOps includes security on the same level as continuous integration and delivery.


D.

DevOps mandates that security is integrated at the beginning of the development lifecycle.


Expert Solution
Questions # 3:

Which membership based organisation produces international standards, which cover good practice for information assurance?

Options:

A.

BSI.


B.

IETF.


C.

OWASP.


D.

ISF.


Expert Solution
Questions # 4:

Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?

Options:

A.

Public.


B.

Private.


C.

Hybrid.


D.

Community


Expert Solution
Questions # 5:

Which of the following is an accepted strategic option for dealing with risk?

Options:

A.

Correction.


B.

Detection.


C.

Forbearance.


D.

Acceptance


Expert Solution
Questions # 6:

What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?

Options:

A.

Threat trees.


B.

STRIDE charts.


C.

Misuse case diagrams.


D.

DREAD diagrams.


Expert Solution
Questions # 7:

For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?

Options:

A.

To reduce the chance of collusion between security staff and those being monitored.


B.

To give experience to monitoring staff across a range of activities for training purposes.


C.

Health and Safety regulations demand that staff are rotated to prevent posture and vision related harm.


D.

The human attention span during intense monitoring sessions is about 20 minutes.


Expert Solution
Questions # 8:

What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?

Options:

A.

Faraday cage.


B.

Unshielded cabling.


C.

Copper infused windows.


D.

White noise generation.


Expert Solution
Questions # 9:

Why might the reporting of security incidents that involve personal data differ from other types of security incident?

Options:

A.

Personal data is not highly transient so its 1 investigation rarely involves the preservation of volatile memory and full forensic digital investigation.


B.

Personal data is normally handled on both IT and non-IT systems so such incidents need to be managed in two streams.


C.

Data Protection legislation normally requires the reporting of incidents involving personal data to a Supervisory Authority.


D.

Data Protection legislation is process-oriented and focuses on quality assurance of procedures and governance rather than data-focused event investigation


Expert Solution
Questions # 10:

When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?

Options:

A.

Remove power from all digital devices at the scene to stop the data changing.


B.

Photograph all evidence and triage to determine whether live data capture is necessary.


C.

Remove all digital evidence from the scene to prevent unintentional damage.


D.

Don't touch any evidence until a senior digital investigator arrives.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions