Pass the BCS Information security and CCP scheme certifications CISMP-V9 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?

Options:

A.

Dynamic Testing.


B.

Static Testing.


C.

User Testing.


D.

Penetration Testing.


Expert Solution
Questions # 12:

A system administrator has created the following "array" as an access control for an organisation.

Developers: create files, update files.

Reviewers: upload files, update files.

Administrators: upload files, delete fifes, update files.

What type of access-control has just been created?

Options:

A.

Task based access control.


B.

Role based access control.


C.

Rule based access control.


D.

Mandatory access control.


Expert Solution
Questions # 13:

Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?

Options:

A.

Sarbanes-Oxley.


B.

GDPR.


C.

HIPAA.


D.

FSA.


Expert Solution
Questions # 14:

Which standard deals with the implementation of business continuity?

Options:

A.

ISO/IEC 27001


B.

COBIT


C.

IS0223G1.


D.

BS5750.


Expert Solution
Questions # 15:

Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?

Options:

A.

User security education.


B.

Intellectual Property Rights.


C.

End-of-service.


D.

Liability


Expert Solution
Questions # 16:

Which of the following is NOT a valid statement to include in an organisation's security policy?

Options:

A.

The policy has the support of Board and the Chief Executive.


B.

The policy has been agreed and amended to suit all third party contractors.


C.

How the organisation will manage information assurance.


D.

The compliance with legal and regulatory obligations.


Expert Solution
Questions # 17:

When securing a wireless network, which of the following is NOT best practice?

Options:

A.

Using WPA encryption on the wireless network.


B.

Use MAC tittering on a SOHO network with a smart group of clients.


C.

Dedicating an access point on a dedicated VLAN connected to a firewall.


D.

Turning on SSID broadcasts to advertise security levels.


Expert Solution
Questions # 18:

Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?

Options:

A.

CERT


B.

SIEM.


C.

CISM.


D.

DDoS.


Expert Solution
Questions # 19:

What type of attack could directly affect the confidentiality of an unencrypted VoIP network?

Options:

A.

Packet Sniffing.


B.

Brute Force Attack.


C.

Ransomware.


D.

Vishing Attack


Expert Solution
Questions # 20:

Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?

Options:

A.

Online retailer.


B.

Traditional market trader.


C.

Mail delivery business.


D.

Agricultural producer.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions