BCS Foundation Certificate in Information Security Management Principles V9.0 - CISMP-V9 模擬練習

What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?

正解: C
解説: (PassTest メンバーにのみ表示されます)
Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?

正解: C
解説: (PassTest メンバーにのみ表示されます)
When establishing objectives for physical security environments, which of the following functional controls SHOULD occur first?

正解: A
解説: (PassTest メンバーにのみ表示されます)
What advantage does the delivery of online security training material have over the distribution of printed media?

正解: C
解説: (PassTest メンバーにのみ表示されます)
In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?

正解: A
解説: (PassTest メンバーにのみ表示されます)
Which of the following is NOT an accepted classification of security controls?

正解: C
解説: (PassTest メンバーにのみ表示されます)
What Is the PRIMARY reason for organisations obtaining outsourced managed security services?

正解: C
解説: (PassTest メンバーにのみ表示されます)
A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.
What type of device has MOST LIKELY been discovered?

正解: C
解説: (PassTest メンバーにのみ表示されます)
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?

正解: D
解説: (PassTest メンバーにのみ表示されます)
Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?

正解: A
解説: (PassTest メンバーにのみ表示されます)