BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Exam Practice Test

Page: 1 / 14
Total 100 questions
Question 1
Question 2

A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.

What technology SHOULD they adapt?



Answer : B

The AAA service, which stands for Authentication, Authorization, and Accounting, is essential for managing user access to network resources. When it comes to providing AAA services for both wireless and remote access network services in a non-proprietary manner, RADIUS (Remote Authentication Dial-In User Service) is the most suitable technology.

RADIUS is an open standard protocol widely used for network access authentication and accounting. It is supported by a variety of network vendors and devices, making it a non-proprietary solution that can be easily integrated into different network environments.RADIUS provides a centralized way to authenticate users, authorize their access levels, and keep track of their activity on the network1.

TACACS+is a Cisco proprietary protocol and therefore does not meet the requirement of avoiding proprietary solutions.

OAuthis a framework for authorization and is not typically used for network access control in the same way that RADIUS is.

MS Access Databaseis not a network authentication protocol and would not provide the necessary AAA services for network security.


Question 3

Why is it prudent for Third Parties to be contracted to meet specific security standards?



Answer : A

Contracting third parties to meet specific security standards is prudent because vulnerabilities within their networks can be exploited to gain unauthorized access to a client's environment. Third-party vendors often have access to an organization's sensitive data and systems, which can become a potential entry point for cyber attackers. By ensuring that third parties adhere to stringent security standards, an organization can better protect itself against the risk of data breaches and cyber attacks that may originate from less secure third-party networks. This proactive approach to third-party security helps maintain the integrity and confidentiality of the organization's data and systems.


Question 4
Question 5
Question 6

Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?



Answer : B

The field of Information Security is dynamic and evolves rapidly, with new threats and technologies emerging regularly. Continual Professional Development (CPD) is crucial in this sphere to ensure that professionals stay up-to-date with the latest security trends, practices, and technologies. CPD enables information security professionals to maintain and enhance their knowledge and skills, which is vital for effectively protecting organizations against the ever-changing threat landscape. This ongoing learning process is not just about retaining credibility or meeting the requirements of professional bodies; it's about ensuring that professionals can respond to new challenges and remain effective in their roles.


Question 7

How might the effectiveness of a security awareness program be effectively measured?

1) Employees are required to take an online multiple choice exam on security principles.

2) Employees are tested with social engineering techniques by an approved penetration tester.

3) Employees practice ethical hacking techniques on organisation systems.

4) No security vulnerabilities are reported during an audit.

5) Open source intelligence gathering is undertaken on staff social media profiles.



Answer : D

The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.

Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.

Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.

Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.

Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.


Page:    1 / 14   
Total 100 questions