Free CISMP-V9 Exam Braindumps (page: 12)

Page 12 of 26

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

  1. Quality Assurance and Control
  2. Dynamic verification.
  3. Static verification.
  4. Source code analysis.

Answer(s): D



What form of attack against an employee has the MOST impact on their compliance with the
organisation's "code of conduct"?

  1. Brute Force Attack.
  2. Social Engineering.
  3. Ransomware.
  4. Denial of Service.

Answer(s): D



When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.

  1. 2 and 3.
  2. 3 and 4.
  3. 1 and 4.
  4. 1 and 2.

Answer(s): C



Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.

  1. Cryptographic Statement.
  2. Security Policy Framework.
  3. Acceptable Usage Policy.
  4. Business Continuity Plan.

Answer(s): A



Page 12 of 26



Post your Comments and Discuss BCS CISMP-V9 exam with other Community members:

bob commented on September 09, 2024
clarification on the level of standards and policy
UNITED STATES
upvote

Lovedeep commented on March 30, 2024
To other guys out there who are going to take this exam. I want to share with you that this exam is extremely hard. Unless you study a lot and use these exam questions dumps you are not going to pass. I pass my exam after 2 attempt but these questions are word by word and was a live saver.
UNITED KINGDOM
upvote

Noobtastic commented on March 29, 2024
In a security governance framework, which of the following publications would be at the HIGHEST level? the answer should be policy
UNITED KINGDOM
upvote

dave commented on March 29, 2024
Question 8 from the official BCS text book "A policy is a high-level statement of an organisation’s values, goals and objectives in a specific area"
Anonymous
upvote

dave commented on March 29, 2024
Question 2 answer is wrong Availability is not one of AAA
Anonymous
upvote

sarra commented on January 17, 2024
the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.
UNITED KINGDOM
upvote

Nikki commented on November 07, 2023
The AAA Triad in Information Security is Authentication, Accounting and Authorisation so the answer should be D 1, 3 and 5.
UNITED KINGDOM
upvote