Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free BCS CISMP-V9 Practice Exam with Questions & Answers | Set: 3

Questions 21

Why is it prudent for Third Parties to be contracted to meet specific security standards?

Options:
A.

Vulnerabilities in Third Party networks can be malevolently leveraged to gain illicit access into client environments.

B.

It is a legal requirement for Third Party support companies to meet client security standards.

C.

All access to corporate systems must be controlled via a single set of rules if they are to be enforceable.

D.

Third Parties cannot connect to other sites and networks without a contract of similar legal agreement.

BCS CISMP-V9 Premium Access
Questions 22

As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?

Options:
A.

To assign access privileges to others.

B.

To modify associated information that may lead to inappropriate disclosure.

C.

To access information held in the same format and file structure.

D.

To delete all indexed data in the dataset.

Questions 23

A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.

What type of device has MOST LIKELY been discovered?

Options:
A.

File server.

B.

Printer.

C.

Firewall.

D.

Web server

Questions 24

Which of the following is an asymmetric encryption algorithm?

Options:
A.

DES.

B.

AES.

C.

ATM.

D.

RSA.

Questions 25

How might the effectiveness of a security awareness program be effectively measured?

1) Employees are required to take an online multiple choice exam on security principles.

2) Employees are tested with social engineering techniques by an approved penetration tester.

3) Employees practice ethical hacking techniques on organisation systems.

4) No security vulnerabilities are reported during an audit.

5) Open source intelligence gathering is undertaken on staff social media profiles.

Options:
A.

3, 4 and 5.

B.

2, 4 and 5.

C.

1, 2 and 3.

D.

1, 2 and 5.

Questions 26

Which of the following describes a qualitative risk assessment approach?

Options:
A.

A subjective assessment of risk occurrence likelihood against the potential impact that determines the overall severity of a risk.

B.

The use of verifiable data to predict the risk occurrence likelihood and the potential impact so as to determine the overall severity of a risk.

C.

The use of Monte-Carlo Analysis and Layers of Protection Analysis (LOPA) to determine the overall severity of a risk.

D.

The use of Risk Tolerance and Risk Appetite values to determine the overall severity of a risk

Questions 27

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?

Options:
A.

ISO/IEC 27001.

B.

Qualitative.

C.

CPNI.

D.

Quantitative

Questions 28

Which of the following international standards deals with the retention of records?

Options:
A.

PCI DSS.

B.

RFC1918.

C.

IS015489.

D.

ISO/IEC 27002.

Questions 29

Which standard deals with the implementation of business continuity?

Options:
A.

ISO/IEC 27001

B.

COBIT

C.

IS0223G1.

D.

BS5750.

Questions 30

Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?

Options:
A.

Professional qualification bodies demand CPD.

B.

Information Security changes constantly and at speed.

C.

IT certifications require CPD and Security needs to remain credible.

D.

CPD is a prerequisite of any Chartered Institution qualification.

Exam Code: CISMP-V9
Certification Provider: BCS
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0
Last Update: Jul 15, 2025
Questions: 100
PDF + Testing Engine
$164.99
$66
Testing Engine
$124.99
$50
PDF (Q&A)
$104.99
$42