Pass the BCS Information security and CCP scheme certifications CISMP-V9 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

What are the different methods that can be used as access controls?

1. Detective.

2. Physical.

3. Reactive.

4. Virtual.

5. Preventive.

Options:

A.

1, 2 and 4.


B.

1, 2 and 3.


C.

1, 2 and 5.


D.

3, 4 and 5.


Expert Solution
Questions # 22:

Which of the following statements relating to digital signatures is TRUE?

Options:

A.

Digital signatures are rarely legally enforceable even if the signers know they are signing a legal document.


B.

Digital signatures are valid and enforceable in law in most countries in the world.


C.

Digital signatures are legal unless there is a statutory requirement that predates the digital age.


D.

A digital signature that uses a signer’s private key is illegal.


Expert Solution
Questions # 23:

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?

Options:

A.

Ensure they are competent to be able to do so and be able to justify their actions.


B.

Ensure they are being observed by a senior investigator in all actions.


C.

Ensure they do not handle the evidence as that must be done by law enforcement officers.


D.

Ensure the data has been adjusted to meet the investigation requirements.


Expert Solution
Questions # 24:

What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?

Options:

A.

Red Team Training.


B.

Blue Team Training.


C.

Black Hat Training.


D.

Awareness Training.


Expert Solution
Questions # 25:

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

Options:

A.

Risk = Likelihood * Impact.


B.

Risk = Likelihood / Impact.


C.

Risk = Vulnerability / Threat.


D.

Risk = Threat * Likelihood.


Expert Solution
Questions # 26:

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?

Options:

A.

ISO/IEC 27001.


B.

Qualitative.


C.

CPNI.


D.

Quantitative


Expert Solution
Questions # 27:

In software engineering, what does 'Security by Design” mean?

Options:

A.

Low Level and High Level Security Designs are restricted in distribution.


B.

All security software artefacts are subject to a code-checking regime.


C.

The software has been designed from its inception to be secure.


D.

All code meets the technical requirements of GDPR.


Expert Solution
Questions # 28:

Which algorithm is a current specification for the encryption of electronic data established by NIST?

Options:

A.

RSA.


B.

AES.


C.

DES.


D.

PGP.


Expert Solution
Questions # 29:

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?

Options:

A.

Appropriate company accreditation and staff certification.


B.

Formal certification to ISO/IEC 27001 and alignment with ISO 17025.


C.

Affiliation with local law enforcement bodies and local government regulations.


D.

Clean credit references as well as international experience.


Expert Solution
Questions # 30:

Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?

Options:

A.

Strong OS patch management


B.

Vulnerability assessment


C.

Signature-based intrusion detection.


D.

Anomaly based intrusion detection.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions