For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?
Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
Which membership based organisation produces international standards, which cover good practice for information assurance?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Which algorithm is a current specification for the encryption of electronic data established by NIST?
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
What Is the KEY purpose of appending security classification labels to information?
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
Information security and CCP scheme certifications | CISMP-V9 Questions Answers | CISMP-V9 Test Prep | BCS Foundation Certificate in Information Security Management Principles V9.0 Questions PDF | CISMP-V9 Online Exam | CISMP-V9 Practice Test | CISMP-V9 PDF | CISMP-V9 Test Questions | CISMP-V9 Study Material | CISMP-V9 Exam Preparation | CISMP-V9 Valid Dumps | CISMP-V9 Real Questions | Information security and CCP scheme certifications CISMP-V9 Exam Questions