Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 30 questions
Exam Code: CISMP-V9                Update: Sep 20, 2025
Exam Name: BCS Foundation Certificate in Information Security Management Principles V9.0

BCS BCS Foundation Certificate in Information Security Management Principles V9.0 CISMP-V9 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

Which of the following is NOT a valid statement to include in an organisation's security policy?

A.

The policy has the support of Board and the Chief Executive.

B.

The policy has been agreed and amended to suit all third party contractors.

C.

How the organisation will manage information assurance.

D.

The compliance with legal and regulatory obligations.

Question # 2

Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?

A.

Online retailer.

B.

Traditional market trader.

C.

Mail delivery business.

D.

Agricultural producer.

Question # 3

In software engineering, what does 'Security by Design” mean?

A.

Low Level and High Level Security Designs are restricted in distribution.

B.

All security software artefacts are subject to a code-checking regime.

C.

The software has been designed from its inception to be secure.

D.

All code meets the technical requirements of GDPR.

Question # 4

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?

A.

Appropriate company accreditation and staff certification.

B.

Formal certification to ISO/IEC 27001 and alignment with ISO 17025.

C.

Affiliation with local law enforcement bodies and local government regulations.

D.

Clean credit references as well as international experience.

Question # 5

What Is the KEY purpose of appending security classification labels to information?

A.

To provide guidance and instruction on implementing appropriate security controls to protect the information.

B.

To comply with whatever mandatory security policy framework is in place within the geographical location in question.

C.

To ensure that should the information be lost in transit, it can be returned to the originator using the correct protocols.

D.

To make sure the correct colour-coding system is used when the information is ready for archive.

Question # 6

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?

A.

Ensure they are competent to be able to do so and be able to justify their actions.

B.

Ensure they are being observed by a senior investigator in all actions.

C.

Ensure they do not handle the evidence as that must be done by law enforcement officers.

D.

Ensure the data has been adjusted to meet the investigation requirements.

Question # 7

Which three of the following characteristics form the AAA Triad in Information Security?

1. Authentication

2. Availability

3. Accounting

4. Asymmetry

5. Authorisation

A.

1, 2 and 3.

B.

2, 4, and 5.

C.

1, 3 and 4.

D.

1, 3 and 5.

Question # 8

What advantage does the delivery of online security training material have over the distribution of printed media?

A.

Updating online material requires a single edit. Printed material needs to be distributed physically.

B.

Online training material is intrinsically more accurate than printed material.

C.

Printed material is a 'discoverable record' and could expose the organisation to litigation in the event of an incident.

D.

Online material is protected by international digital copyright legislation across most territories.

Question # 9

Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?

A.

Professional qualification bodies demand CPD.

B.

Information Security changes constantly and at speed.

C.

IT certifications require CPD and Security needs to remain credible.

D.

CPD is a prerequisite of any Chartered Institution qualification.

Question # 10

Which algorithm is a current specification for the encryption of electronic data established by NIST?

A.

RSA.

B.

AES.

C.

DES.

D.

PGP.

Page: 1 / 3
Total 30 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 21 Sep 2025