BCS CISMP-V9 BCS Foundation Certificate in Information Security Management Principles V9.0 Exam Practice Test

Page: 1 / 14
Total 100 questions
Question 1
Question 2

Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?



Answer : C

A hot site is a type of disaster recovery facility that is fully equipped and ready to take over operation at a moment's notice. It includes HVAC, power, communications infrastructure, computing hardware, and a real-time duplication of the organization's existing ''live'' data. This enables an organization to resume operations quickly after a disaster with minimal downtime. Hot sites are typically maintained at a state of readiness and can become operational almost immediately after an incident occurs. This contrasts with cold sites, which provide space and infrastructure but require installation and configuration of equipment, and warm sites, which are partially equipped with some operational resources.


Question 3
Question 4
Question 5

Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?



Answer : A

In the context of cloud delivery models, the term ''trusted'' typically refers to the level of security control and assurance that clients can expect. Among the options provided, thePubliccloud delivery model is generally considered to be the least ''trusted'' in terms of security by clients using the service. This is because public clouds are shared environments where the infrastructure and services are owned and operated by a third-party provider and shared among multiple tenants. The multi-tenant nature of public clouds can introduce risks such as data breaches or other security incidents that might not be as prevalent in more controlled environments.

In contrast,Privateclouds are dedicated to a single organization, providing more control over data, security, and compliance.Hybridclouds combine both public and private elements, offering a balance of control and flexibility.Communityclouds are shared between organizations with common goals and compliance requirements, offering a level of trust tailored to the group's needs.

Therefore, while all cloud models come with their own security considerations and potential risks, the public cloud model is typically the one where clients have to place more trust in the provider's security measures, as they have less control over the environment.


Question 6

Why is it prudent for Third Parties to be contracted to meet specific security standards?



Answer : A

Contracting third parties to meet specific security standards is prudent because vulnerabilities within their networks can be exploited to gain unauthorized access to a client's environment. Third-party vendors often have access to an organization's sensitive data and systems, which can become a potential entry point for cyber attackers. By ensuring that third parties adhere to stringent security standards, an organization can better protect itself against the risk of data breaches and cyber attacks that may originate from less secure third-party networks. This proactive approach to third-party security helps maintain the integrity and confidentiality of the organization's data and systems.


Question 7
Page:    1 / 14   
Total 100 questions