Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

BCS Foundation Certificate in Information Security Management Principles V9.0

Last Update 4 hours ago Total Questions : 100

The BCS Foundation Certificate in Information Security Management Principles V9.0 content is now fully updated, with all current exam questions added 4 hours ago. Deciding to include CISMP-V9 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CISMP-V9 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CISMP-V9 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any BCS Foundation Certificate in Information Security Management Principles V9.0 practice test comfortably within the allotted time.

Question # 1

Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?

A.

Dynamic Testing.

B.

Static Testing.

C.

User Testing.

D.

Penetration Testing.

Question # 2

In a security governance framework, which of the following publications would be at the HIGHEST level?

A.

Procedures.

B.

Standards

C.

Policy.

D.

Guidelines

Question # 3

Which of the following statements relating to digital signatures is TRUE?

A.

Digital signatures are rarely legally enforceable even if the signers know they are signing a legal document.

B.

Digital signatures are valid and enforceable in law in most countries in the world.

C.

Digital signatures are legal unless there is a statutory requirement that predates the digital age.

D.

A digital signature that uses a signer’s private key is illegal.

Question # 4

Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?

A.

Cold site.

B.

Warm site.

C.

Hot site.

D.

Spare site

Question # 5

How does network visualisation assist in managing information security?

A.

Visualisation can communicate large amounts of data in a manner that is a relatively simple way for people to analyse and interpret.

B.

Visualisation provides structured tables and lists that can be analysed using common tools such as MS Excel.

C.

Visualisation offers unstructured data that records the entirety of the data in a flat, filterable ftle format.

D.

Visualisation software operates in a way that is rarely and thereby it is less prone to malware infection.

Question # 6

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

A.

System Integrity.

B.

Sandboxing.

C.

Intrusion Prevention System.

D.

Defence in depth.

Question # 7

When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?

1 Third party is competent to process the data securely.

2. Observes the same high standards as data owner.

3. Processes the data wherever the data can be transferred.

4. Archive the data for long term third party's own usage.

A.

2 and 3.

B.

3 and 4.

C.

1 and 4.

D.

1 and 2.

Question # 8

When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?

A.

Spear Phishing.

B.

Shoulder Surfing.

C.

Dumpster Diving.

D.

Tailgating.

Question # 9

Which of the following is NOT a valid statement to include in an organisation's security policy?

A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Question # 10

Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?

A.

Data Deletion.

B.

Data Archiving.

C.

Data Storage.

D.

Data Publication

Go to page: