BCS CISMP-V9 Exam
BCS Foundation Certificate in Information Security Management Principles V9.0 (Page 3 )

Updated On: 19-Jan-2026

A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?

  1. TACACS+
  2. RADIUS.
  3. Oauth.
  4. MS Access Database.

Answer(s): C



Why is it prudent for Third Parties to be contracted to meet specific security standards?

  1. Vulnerabilities in Third Party networks can be malevolently leveraged to gain illicit access into client environments.
  2. It is a legal requirement for Third Party support companies to meet client security standards.
  3. All access to corporate systems must be controlled via a single set of rules if they are to be enforceable.
  4. Third Parties cannot connect to other sites and networks without a contract of similar legal agreement.

Answer(s): C



Which cryptographic protocol preceded Transport Layer Security (TLS)?

  1. Public Key Infrastructure (PKI).
  2. Simple Network Management Protocol (SNMP).
  3. Secure Sockets Layer (SSL).
  4. Hypertext Transfer Protocol Secure (HTTPS)

Answer(s): C



When securing a wireless network, which of the following is NOT best practice?

  1. Using WPA encryption on the wireless network.
  2. Use MAC tittering on a SOHO network with a smart group of clients.
  3. Dedicating an access point on a dedicated VLAN connected to a firewall.
  4. Turning on SSID broadcasts to advertise security levels.

Answer(s): C



What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?

  1. Poor Password Management.
  2. Insecure Deserialsiation.
  3. Injection Flaws.
  4. Security Misconfiguration

Answer(s): C



Viewing page 3 of 21
Viewing questions 11 - 15 out of 100 questions



Post your Comments and Discuss BCS CISMP-V9 exam prep with other Community members:

Join the CISMP-V9 Discussion