BCS Foundation Certificate in Information Security Management Principles V9.0 CISMP-V9 Exam Practice Test

Page: 1 / 14
Total 100 questions
Question 1

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?



Answer : A

When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.


Question 2

Which standard deals with the implementation of business continuity?



Answer : C

The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.


Question 3

In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?



Answer : A

Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.


Question 4

Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?



Answer : A

Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.

The principles of Information Security Management emphasize the importance of protecting sensitive data, such as credit card information, through technical security controls and risk management practices.Online retailers must implement robust security measures, including encryption, secure payment gateways, and regular security audits, to mitigate the risks associated with electronic transactions12.


BCS Information Security Management Principles, particularly the sections on Technical Security Controls and Information Risk, provide guidance on protecting electronic data and managing the associated risks1.

Additional insights can be found in the Information Security Management Principles, 3rd Edition by Andy Taylor, David Alexander, Amanda Finch, David Sutton2.

Question 5

Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?



Answer : B

The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.

While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.


Question 6
Question 7

In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?



Answer : D

Maintaining the currency of risk countermeasures is a continuous process due to the ever-changing nature of risks. Organizations should regularly review and update their risk assessments and countermeasures to ensure they are effective against current threats. This is because new vulnerabilities can emerge, and threat actors can develop new techniques, making previously effective countermeasures obsolete. Therefore, risks should remain under constant review to adapt to the dynamic security landscape, ensuring that the organization's security posture is resilient and responsive to new information or changes in the environment.


Page:    1 / 14   
Total 100 questions