BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Exam Practice Test

Page: 1 / 14
Total 100 questions
Question 1
Question 2

A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.

What technology SHOULD they adapt?



Answer : B

The AAA service, which stands for Authentication, Authorization, and Accounting, is essential for managing user access to network resources. When it comes to providing AAA services for both wireless and remote access network services in a non-proprietary manner, RADIUS (Remote Authentication Dial-In User Service) is the most suitable technology.

RADIUS is an open standard protocol widely used for network access authentication and accounting. It is supported by a variety of network vendors and devices, making it a non-proprietary solution that can be easily integrated into different network environments.RADIUS provides a centralized way to authenticate users, authorize their access levels, and keep track of their activity on the network1.

TACACS+is a Cisco proprietary protocol and therefore does not meet the requirement of avoiding proprietary solutions.

OAuthis a framework for authorization and is not typically used for network access control in the same way that RADIUS is.

MS Access Databaseis not a network authentication protocol and would not provide the necessary AAA services for network security.


Question 3

Why is it prudent for Third Parties to be contracted to meet specific security standards?



Answer : A

Contracting third parties to meet specific security standards is prudent because vulnerabilities within their networks can be exploited to gain unauthorized access to a client's environment. Third-party vendors often have access to an organization's sensitive data and systems, which can become a potential entry point for cyber attackers. By ensuring that third parties adhere to stringent security standards, an organization can better protect itself against the risk of data breaches and cyber attacks that may originate from less secure third-party networks. This proactive approach to third-party security helps maintain the integrity and confidentiality of the organization's data and systems.


Question 4
Question 5
Question 6

What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?



Answer : C

According to the OWASP Top 10 list, Injection Flaws are among the most prolific web application vulnerabilities. This category includes a variety of attacks such as SQL, NoSQL, OS, and LDAP injection where untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data. Injection flaws are particularly dangerous because they can lead to data breaches, loss of data integrity, and denial of service, among other impacts.


Question 7
Page:    1 / 14   
Total 100 questions