Free CISMP-V9 Exam Braindumps (page: 4)

Page 4 of 26

Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?

  1. Use of 'cheap" microcontroller based sensors.
  2. Much larger attack surface than traditional IT systems.
  3. Use of proprietary networking protocols between nodes.
  4. Use of cloud based systems to collect loT data.

Answer(s): D



Which of the following is NOT an information security specific vulnerability?

  1. Use of HTTP based Apache web server.
  2. Unpatched Windows operating system.
  3. Confidential data stored in a fire safe.
  4. Use of an unlocked filing cabinet.

Answer(s): A



What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?

  1. Most BYOD involves the use of non-Windows hardware which is intrinsically insecure and open to abuse.
  2. The organisation has significantly less control over the device than over a corporately provided and managed device.
  3. Privately owned end user devices are not provided with the same volume nor frequency of security patch updates as a corporation.
  4. Under GDPR it is illegal for an individual to use a personal device when handling personal information under corporate control.

Answer(s): A



Which of the following describes a qualitative risk assessment approach?

  1. A subjective assessment of risk occurrence likelihood against the potential impact that determines the overall severity of a risk.
  2. The use of verifiable data to predict the risk occurrence likelihood and the potential impact so as to determine the overall severity of a risk.
  3. The use of Monte-Carlo Analysis and Layers of Protection Analysis (LOPA) to determine the overall severity of a risk.
  4. The use of Risk Tolerance and Risk Appetite values to determine the overall severity of a risk

Answer(s): C



Page 4 of 26



Post your Comments and Discuss BCS CISMP-V9 exam with other Community members:

bob commented on September 09, 2024
clarification on the level of standards and policy
UNITED STATES
upvote

Lovedeep commented on March 30, 2024
To other guys out there who are going to take this exam. I want to share with you that this exam is extremely hard. Unless you study a lot and use these exam questions dumps you are not going to pass. I pass my exam after 2 attempt but these questions are word by word and was a live saver.
UNITED KINGDOM
upvote

Noobtastic commented on March 29, 2024
In a security governance framework, which of the following publications would be at the HIGHEST level? the answer should be policy
UNITED KINGDOM
upvote

dave commented on March 29, 2024
Question 8 from the official BCS text book "A policy is a high-level statement of an organisation’s values, goals and objectives in a specific area"
Anonymous
upvote

dave commented on March 29, 2024
Question 2 answer is wrong Availability is not one of AAA
Anonymous
upvote

sarra commented on January 17, 2024
the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.
UNITED KINGDOM
upvote

Nikki commented on November 07, 2023
The AAA Triad in Information Security is Authentication, Accounting and Authorisation so the answer should be D 1, 3 and 5.
UNITED KINGDOM
upvote