Free CISMP-V9 Exam Braindumps (page: 13)

Page 12 of 26

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

  1. Quality Assurance and Control
  2. Dynamic verification.
  3. Static verification.
  4. Source code analysis.

Answer(s): D



What form of attack against an employee has the MOST impact on their compliance with the
organisation's "code of conduct"?

  1. Brute Force Attack.
  2. Social Engineering.
  3. Ransomware.
  4. Denial of Service.

Answer(s): D



When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.

  1. 2 and 3.
  2. 3 and 4.
  3. 1 and 4.
  4. 1 and 2.

Answer(s): C



Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.

  1. Cryptographic Statement.
  2. Security Policy Framework.
  3. Acceptable Usage Policy.
  4. Business Continuity Plan.

Answer(s): A






Post your Comments and Discuss BCS CISMP-V9 exam with other Community members:

Exam Discussions & Posts