Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the BCS Information security and CCP scheme certifications CISMP-V9 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CISMP-V9 Premium Access

View all detail and faqs for the CISMP-V9 exam


335 Students Passed

91% Average Score

95% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.

What technology would be MOST beneficial to his organisation?

Options:

A.

VPN.

B.

IDS.

C.

MDM.

D.

SIEM.

Questions # 2:

Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?

Options:

A.

User security education.

B.

Intellectual Property Rights.

C.

End-of-service.

D.

Liability

Questions # 3:

Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?

Options:

A.

Sarbanes-Oxley.

B.

GDPR.

C.

HIPAA.

D.

FSA.

Questions # 4:

Which of the following is an accepted strategic option for dealing with risk?

Options:

A.

Correction.

B.

Detection.

C.

Forbearance.

D.

Acceptance

Questions # 5:

Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?

Options:

A.

PCI DSS.

B.

TOGAF.

C.

ENISA NIS.

D.

Sarbanes-Oxiey

Questions # 6:

What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?

Options:

A.

Brute Force Attack.

B.

Social Engineering.

C.

Ransomware.

D.

Denial of Service.

Questions # 7:

Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?

Options:

A.

Dynamic Testing.

B.

Static Testing.

C.

User Testing.

D.

Penetration Testing.

Questions # 8:

Which of the following is NOT a valid statement to include in an organisation's security policy?

Options:

A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Questions # 9:

Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?

1. Intellectual Property Rights.

2. Protection of Organisational Records

3. Forensic recovery of data.

4. Data Deduplication.

5. Data Protection & Privacy.

Options:

A.

1, 2 and 3

B.

3, 4 and 5

C.

2, 3 and 4

D.

1, 2 and 5

Questions # 10:

Which of the following is NOT considered to be a form of computer misuse?

Options:

A.

Illegal retention of personal data.

B.

Illegal interception of information.

C.

Illegal access to computer systems.

D.

Downloading of pirated software.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.