BCS Foundation Certificate in Information Security Management Principles V9.0 CISMP-V9 Exam Practice Test

Page: 1 / 14
Total 100 questions
Question 1
Question 2

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?



Answer : A

When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.


Question 3
Question 4

Which of the following is NOT an information security specific vulnerability?



Answer : C

In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:

A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.

B: An unpatched Windows operating system could have known security flaws that can be exploited.

D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.

Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.


Question 5

Which of the following is NOT a valid statement to include in an organisation's security policy?



Answer : B

An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.


Question 6
Question 7

Which membership based organisation produces international standards, which cover good practice for information assurance?



Answer : A

The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.


Page:    1 / 14   
Total 100 questions