Curious about Actual BCS Information Security and CCP Scheme Certifications (CISMP-V9) Exam Questions?

Here are sample BCS Foundation Certificate in Information Security Management Principles V9.0 (CISMP-V9) Exam questions from real exam. You can get more BCS Information Security and CCP Scheme Certifications (CISMP-V9) Exam premium practice questions at TestInsights.

Page: 1 /
Total 100 questions
Question 1

Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?


Correct : A

In the context of cloud delivery models, the term ''trusted'' typically refers to the level of security control and assurance that clients can expect. Among the options provided, thePubliccloud delivery model is generally considered to be the least ''trusted'' in terms of security by clients using the service. This is because public clouds are shared environments where the infrastructure and services are owned and operated by a third-party provider and shared among multiple tenants. The multi-tenant nature of public clouds can introduce risks such as data breaches or other security incidents that might not be as prevalent in more controlled environments.

In contrast,Privateclouds are dedicated to a single organization, providing more control over data, security, and compliance.Hybridclouds combine both public and private elements, offering a balance of control and flexibility.Communityclouds are shared between organizations with common goals and compliance requirements, offering a level of trust tailored to the group's needs.

Therefore, while all cloud models come with their own security considerations and potential risks, the public cloud model is typically the one where clients have to place more trust in the provider's security measures, as they have less control over the environment.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?


Correct : D

Anomaly-based intrusion detection systems (IDS) are particularly effective in detecting zero-day attacks because they do not rely on known signatures, which zero-day attacks would not have. Instead, they monitor network behavior for deviations from a baseline of normal activity.This approach can identify suspicious activities that could indicate a novel or unknown threat, such as a zero-day exploit12345.These systems use various methods, including machine learning and deep learning, to detect patterns that could signify an attack, making them a robust solution against the unpredictable nature of zero-day threats12345.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?


Correct : A

Arson is an act of intentionally setting fire to property for malicious reasons. It is a criminal act and is not classified as a natural disaster. Natural disasters are events that occur due to natural processes of the Earth, such as tsunamis, lightning strikes, and other weather-related events. An electromagnetic pulse can be a natural event if it is caused by solar flares or a man-made event if it is the result of a nuclear explosion.However, arson is always the result of human activity and is not caused by natural processes1.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?


Correct : C

A hot site is a type of disaster recovery facility that is fully equipped and ready to take over operation at a moment's notice. It includes HVAC, power, communications infrastructure, computing hardware, and a real-time duplication of the organization's existing ''live'' data. This enables an organization to resume operations quickly after a disaster with minimal downtime. Hot sites are typically maintained at a state of readiness and can become operational almost immediately after an incident occurs. This contrasts with cold sites, which provide space and infrastructure but require installation and configuration of equipment, and warm sites, which are partially equipped with some operational resources.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?


Correct : A

The key principle a digital forensics investigator must adhere to is ensuring competence and the ability to justify their actions. This is crucial because the integrity of the investigation and the evidence must be maintained. Competence ensures that the investigator has the necessary skills and knowledge to handle and analyze the data correctly. Being able to justify their actions is important for the legal process, as every step of the investigation may be scrutinized in court.This principle aligns with the Information Security Management Principles, which emphasize the importance of procedural/people security controls and technical security controls to maintain the confidentiality, integrity, and availability of information.Reference: BCS Foundation Certificate in Information Security Management Principles1.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 20   
Total 100 questions