Free CISMP-V9 Exam Braindumps (page: 11)

Page 11 of 26

What does a penetration test do that a Vulnerability Scan does NOT?

  1. A penetration test seeks to actively exploit any known or discovered vulnerabilities.
  2. A penetration test looks for known vulnerabilities and reports them without further action.
  3. A penetration test is always an automated process - a vulnerability scan never is.
  4. A penetration test never uses common tools such as Nrnap, Nessus and Metasploit.

Answer(s): B



Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?

  1. CERT
  2. SIEM.
  3. CISM.
  4. DDoS.

Answer(s): B


Reference:

https://en.wikipedia.org/wiki/Security_information_and_event_management



James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?

  1. Free Source.
  2. Proprietary Source.
  3. Interpreted Source.
  4. Open Source.

Answer(s): C



Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?

  1. Dynamic Testing.
  2. Static Testing.
  3. User Testing.
  4. Penetration Testing.

Answer(s): D



Page 11 of 26



Post your Comments and Discuss BCS CISMP-V9 exam with other Community members:

bob commented on September 09, 2024
clarification on the level of standards and policy
UNITED STATES
upvote

Lovedeep commented on March 30, 2024
To other guys out there who are going to take this exam. I want to share with you that this exam is extremely hard. Unless you study a lot and use these exam questions dumps you are not going to pass. I pass my exam after 2 attempt but these questions are word by word and was a live saver.
UNITED KINGDOM
upvote

Noobtastic commented on March 29, 2024
In a security governance framework, which of the following publications would be at the HIGHEST level? the answer should be policy
UNITED KINGDOM
upvote

dave commented on March 29, 2024
Question 8 from the official BCS text book "A policy is a high-level statement of an organisation’s values, goals and objectives in a specific area"
Anonymous
upvote

dave commented on March 29, 2024
Question 2 answer is wrong Availability is not one of AAA
Anonymous
upvote

sarra commented on January 17, 2024
the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.
UNITED KINGDOM
upvote

Nikki commented on November 07, 2023
The AAA Triad in Information Security is Authentication, Accounting and Authorisation so the answer should be D 1, 3 and 5.
UNITED KINGDOM
upvote