Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free BCS CISMP-V9 Practice Exam with Questions & Answers

Questions 1

In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?

Options:
A.

Once defined, they do not need reviewing.

B.

A maximum of once every other month.

C.

When the next risk audit is due.

D.

Risks remain under constant review.

BCS CISMP-V9 Premium Access
Questions 2

Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.

What technology would be MOST beneficial to his organisation?

Options:
A.

VPN.

B.

IDS.

C.

MDM.

D.

SIEM.

Questions 3

Which of the following is NOT a valid statement to include in an organisation's security policy?

Options:
A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Questions 4

One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.

What system from the following does NOT natively support syslog events?

Options:
A.

Enterprise Wireless Access Point.

B.

Windows Desktop Systems.

C.

Linux Web Server Appliances.

D.

Enterprise Stateful Firewall.

Questions 5

Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?

1. Intellectual Property Rights.

2. Protection of Organisational Records

3. Forensic recovery of data.

4. Data Deduplication.

5. Data Protection & Privacy.

Options:
A.

1, 2 and 3

B.

3, 4 and 5

C.

2, 3 and 4

D.

1, 2 and 5

Questions 6

What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?

Options:
A.

End-to-end testing.

B.

Non-dynamic modeling

C.

Desk-top exercise.

D.

Fault stressing

Questions 7

When an organisation decides to operate on the public cloud, what does it lose?

Options:
A.

The right to audit and monitor access to its information.

B.

Control over Intellectual Property Rights relating to its applications.

C.

Physical access to the servers hosting its information.

D.

The ability to determine in which geographies the information is stored.

Questions 8

You are undertaking a qualitative risk assessment of a likely security threat to an information system.

What is the MAIN issue with this type of risk assessment?

Options:
A.

These risk assessments are largely subjective and require agreement on rankings beforehand.

B.

Dealing with statistical and other numeric data can often be hard to interpret.

C.

There needs to be a large amount of previous data to "train" a qualitative risk methodology.

D.

It requires the use of complex software tools to undertake this risk assessment.

Questions 9

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

Options:
A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.

Questions 10

Which types of organisations are likely to be the target of DDoS attacks?

Options:
A.

Cloud service providers.

B.

Any financial sector organisations.

C.

Online retail based organisations.

D.

Any organisation with an online presence.

Exam Code: CISMP-V9
Certification Provider: BCS
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Jul 16, 2025
Questions: 100
PDF + Testing Engine
$164.99
$66
Testing Engine
$124.99
$50
PDF (Q&A)
$104.99
$42