CISMP-V9 Dumps

CISMP-V9 Free Practice Test

BCS CISMP-V9: BCS Foundation Certificate in Information Security Management Principles V9.0

QUESTION 16

When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always betaken into consideration?

Correct Answer: A

QUESTION 17

How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?

Correct Answer: B

QUESTION 18

In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BCexercise or real plan invocation?

Correct Answer: A

QUESTION 19

Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?

Correct Answer: A
https://hr.nd.edu/assets/17442/behavior_model_4_ratings_3_.pdf

QUESTION 20

What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?

Correct Answer: C