BCS Foundation Certificate in Information Security Management Principles V9.0 CISMP-V9 Exam Questions

Page: 1 / 14
Total 100 questions
Question 1

Which of the following is MOST LIKELY to be described as a consequential loss?



Answer : A

Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.


Question 2

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?



Answer : D

Quantitative risk assessment is the process of objectively measuring risk by assigning numerical values to the probability of an event occurring and its potential impact. This method is most likely to provide objective support for a security Return on Investment (ROI) case because it allows for the calculation of potential losses in monetary terms, which can be directly compared to the cost of implementing security measures. By quantifying risks and their financial implications, organizations can make informed decisions about where to allocate resources and how to prioritize security investments to maximize ROI. This approach is particularly useful when making a business case to stakeholders who require clear, financial justification for security expenditures.


Question 3

When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?



Answer : D

The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.


Question 4

Which of the following is an asymmetric encryption algorithm?



Answer : D

RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.


Question 5

When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?

1 Third party is competent to process the data securely.

2. Observes the same high standards as data owner.

3. Processes the data wherever the data can be transferred.

4. Archive the data for long term third party's own usage.



Answer : D

When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.


Question 6

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?



Answer : D

Defence in depth is a security concept that involves implementing multiple layers of security controls throughout an information system. The idea is that if one control fails or a vulnerability is exploited, other controls will provide redundancy and continue to protect the system. This approach is analogous to a physical fortress with multiple walls; if an attacker breaches one wall, additional barriers exist to stop them from progressing further. In the context of information security, this could include a combination of firewalls, intrusion detection systems, antivirus software, and strict access controls, among others. Defence in depth is designed to address security vulnerabilities not only in technology but also in processes and people, acknowledging that human error or negligence can often lead to security breaches.


Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.

The principles of Information Security Management emphasize the importance of protecting sensitive data, such as credit card information, through technical security controls and risk management practices.Online retailers must implement robust security measures, including encryption, secure payment gateways, and regular security audits, to mitigate the risks associated with electronic transactions12.

BCS Information Security Management Principles, particularly the sections on Technical Security Controls and Information Risk, provide guidance on protecting electronic data and managing the associated risks1.

Additional insights can be found in the Information Security Management Principles, 3rd Edition by Andy Taylor, David Alexander, Amanda Finch, David Sutton2.

Question 7

How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?



Answer : C

Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.


Page:    1 / 14   
Total 100 questions