Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 2
Total 100 questions

Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?

A.

PCI DSS.

B.

TOGAF.

C.

ENISA NIS.

D.

Sarbanes-Oxiey

The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.

Which of the below business practices does this statement define?

A.

Information Lifecycle Management.

B.

Information Quality Management.

C.

Total Quality Management.

D.

Business Continuity Management.

Which of the following is an asymmetric encryption algorithm?

A.

DES.

B.

AES.

C.

ATM.

D.

RSA.

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?

A.

Arson.

B.

Electromagnetic pulse

C.

Tsunami.

D.

Lightning Strike

Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?

A.

Strong OS patch management

B.

Vulnerability assessment

C.

Signature-based intrusion detection.

D.

Anomaly based intrusion detection.

What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?

A.

Threat trees.

B.

STRIDE charts.

C.

Misuse case diagrams.

D.

DREAD diagrams.

Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?

A.

Public.

B.

Private.

C.

Hybrid.

D.

Community

For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?

A.

To reduce the chance of collusion between security staff and those being monitored.

B.

To give experience to monitoring staff across a range of activities for training purposes.

C.

Health and Safety regulations demand that staff are rotated to prevent posture and vision related harm.

D.

The human attention span during intense monitoring sessions is about 20 minutes.

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?

A.

Appropriate company accreditation and staff certification.

B.

Formal certification to ISO/IEC 27001 and alignment with ISO 17025.

C.

Affiliation with local law enforcement bodies and local government regulations.

D.

Clean credit references as well as international experience.

When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?

1 Third party is competent to process the data securely.

2. Observes the same high standards as data owner.

3. Processes the data wherever the data can be transferred.

4. Archive the data for long term third party's own usage.

A.

2 and 3.

B.

3 and 4.

C.

1 and 4.

D.

1 and 2.

Page: 2 / 2
Total 100 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved