Free CISMP-V9 Exam Braindumps (page: 8)

Page 7 of 26

Why might the reporting of security incidents that involve personal data differ from other types of security incident?

  1. Personal data is not highly transient so its 1 investigation rarely involves the preservation of volatile memory and full forensic digital investigation.
  2. Personal data is normally handled on both IT and non-IT systems so such incidents need to be managed in two streams.
  3. Data Protection legislation normally requires the reporting of incidents involving personal data to a Supervisory Authority.
  4. Data Protection legislation is process-oriented and focuses on quality assurance of procedures and governance rather than data-focused event investigation

Answer(s): D



When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?

  1. Digital evidence must not be altered unless absolutely necessary.
  2. Acquiring digital evidence cart only be carried on digital devices which have been turned off.
  3. Digital evidence can only be handled by a member of law enforcement.
  4. Digital devices must be forensically "clean" before investigation.

Answer(s): D



Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?

1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.

  1. 1, 2 and 3
  2. 3, 4 and 5
  3. 2, 3 and 4
  4. 1, 2 and 5

Answer(s): D



Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?

  1. Under the European Convention of Human Rights, the interception of telecommunications represents an interference with the right to privacy.
  2. GDPR overrides all previous legislation on information handling, so new laws were needed to ensure authorities did not inadvertently break the law.
  3. Police could previously intercept without lawful authority any communications in the course of transmission through a public post or telecoms system.
  4. Surveillance of a conversation or an online message by law enforcement agents was previously illegal due to the 1950 version of the Human Rights Convention.

Answer(s): C






Post your Comments and Discuss BCS CISMP-V9 exam with other Community members:

CISMP-V9 Exam Discussions & Posts