{"id":22378,"date":"2021-04-14T02:58:55","date_gmt":"2021-04-14T02:58:55","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=22378"},"modified":"2021-04-14T02:58:59","modified_gmt":"2021-04-14T02:58:59","slug":"bcs-foundation-certificate-in-information-security-management-principles-v9-0-cismp-v9-dumps","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/bcs-foundation-certificate-in-information-security-management-principles-v9-0-cismp-v9-dumps.html","title":{"rendered":"BCS Foundation Certificate in Information Security Management Principles V9.0 CISMP-V9 Dumps"},"content":{"rendered":"\n<p><span dir=\"ltr\">New released CISMP-V9 dumps are available for your BCS Foundation Certificate in Information Security Management Principles certification. The certificate is relevant to anyone requiring an understanding of<\/span><span dir=\"ltr\">the<\/span><span dir=\"ltr\">BCS Foundation <\/span><span dir=\"ltr\">Certificate in Information Security Management Principles including those who have <\/span><span dir=\"ltr\">information security respo<\/span><span dir=\"ltr\">nsibilities as part of their day to day role, or who are thinking of <\/span><span dir=\"ltr\">moving into an information security or related function. You can come to DumpsBase to get CISMP-V9 dumps which contain 100 questions with verified answers to help you clear your CISMP-V9 exam successfully.<br \/><\/span><\/p>\n<h1>Read <span style=\"color: #993300;\">CISMP-V9 free dumps<\/span> online before take your CISMP-V9 exam<\/h1>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam5317\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-5317\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-5317\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-174743'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='174743' \/><input type='hidden' id='answerType174743' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174743[]' id='answer-id-705407' class='answer   answerof-174743 ' value='705407'   \/><label for='answer-id-705407' id='answer-label-705407' class=' answer'><span>Faraday cage.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174743[]' id='answer-id-705408' class='answer   answerof-174743 ' value='705408'   \/><label for='answer-id-705408' id='answer-label-705408' class=' answer'><span>Unshielded cabling.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174743[]' id='answer-id-705409' class='answer   answerof-174743 ' value='705409'   \/><label for='answer-id-705409' id='answer-label-705409' class=' answer'><span>Copper infused windows.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174743[]' id='answer-id-705410' class='answer   answerof-174743 ' value='705410'   \/><label for='answer-id-705410' id='answer-label-705410' class=' answer'><span>White noise generation.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-174744'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>In software engineering, what does 'Security by Design\u201dmean?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='174744' \/><input type='hidden' id='answerType174744' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174744[]' id='answer-id-705411' class='answer   answerof-174744 ' value='705411'   \/><label for='answer-id-705411' id='answer-label-705411' class=' answer'><span>Low Level and High Level Security Designs are restricted in distribution.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174744[]' id='answer-id-705412' class='answer   answerof-174744 ' value='705412'   \/><label for='answer-id-705412' id='answer-label-705412' class=' answer'><span>All security software artefacts are subject to a code-checking regime.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174744[]' id='answer-id-705413' class='answer   answerof-174744 ' value='705413'   \/><label for='answer-id-705413' id='answer-label-705413' class=' answer'><span>The software has been designed from its inception to be secure.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174744[]' id='answer-id-705414' class='answer   answerof-174744 ' value='705414'   \/><label for='answer-id-705414' id='answer-label-705414' class=' answer'><span>All code meets the technical requirements of GDP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-174745'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD)within the Information Securitysphere?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='174745' \/><input type='hidden' id='answerType174745' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174745[]' id='answer-id-705415' class='answer   answerof-174745 ' value='705415'   \/><label for='answer-id-705415' id='answer-label-705415' class=' answer'><span>Professional qualification bodies demand CP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174745[]' id='answer-id-705416' class='answer   answerof-174745 ' value='705416'   \/><label for='answer-id-705416' id='answer-label-705416' class=' answer'><span>Information Security changes constantly and at speed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174745[]' id='answer-id-705417' class='answer   answerof-174745 ' value='705417'   \/><label for='answer-id-705417' id='answer-label-705417' class=' answer'><span>IT certifications require CPD and Security needs to remain credible.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174745[]' id='answer-id-705418' class='answer   answerof-174745 ' value='705418'   \/><label for='answer-id-705418' id='answer-label-705418' class=' answer'><span>CPD is a prerequisite of any Chartered Institution qualification.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-174746'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='174746' \/><input type='hidden' id='answerType174746' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174746[]' id='answer-id-705419' class='answer   answerof-174746 ' value='705419'   \/><label for='answer-id-705419' id='answer-label-705419' class=' answer'><span>Red Team Training.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174746[]' id='answer-id-705420' class='answer   answerof-174746 ' value='705420'   \/><label for='answer-id-705420' id='answer-label-705420' class=' answer'><span>Blue Team Training.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174746[]' id='answer-id-705421' class='answer   answerof-174746 ' value='705421'   \/><label for='answer-id-705421' id='answer-label-705421' class=' answer'><span>Black Hat Training.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174746[]' id='answer-id-705422' class='answer   answerof-174746 ' value='705422'   \/><label for='answer-id-705422' id='answer-label-705422' class=' answer'><span>Awareness Training.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-174747'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>What advantage does the delivery of online security training material have over the distribution of printed media?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='174747' \/><input type='hidden' id='answerType174747' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174747[]' id='answer-id-705423' class='answer   answerof-174747 ' value='705423'   \/><label for='answer-id-705423' id='answer-label-705423' class=' answer'><span>Updating online material requires a single edit. Printed material needs to be distributed physically.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174747[]' id='answer-id-705424' class='answer   answerof-174747 ' value='705424'   \/><label for='answer-id-705424' id='answer-label-705424' class=' answer'><span>Online training material is intrinsically more accurate than printed material.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174747[]' id='answer-id-705425' class='answer   answerof-174747 ' value='705425'   \/><label for='answer-id-705425' id='answer-label-705425' class=' answer'><span>Printed material is a 'discoverable record' and could expose the organisation to litigation in the event of an incident.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174747[]' id='answer-id-705426' class='answer   answerof-174747 ' value='705426'   \/><label for='answer-id-705426' id='answer-label-705426' class=' answer'><span>Online material is protected by international digital copyright legislation across most territories.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-174748'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='174748' \/><input type='hidden' id='answerType174748' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174748[]' id='answer-id-705427' class='answer   answerof-174748 ' value='705427'   \/><label for='answer-id-705427' id='answer-label-705427' class=' answer'><span>Under the European Convention of Human Rights, the interception of telecommunications represents aninterference with the right toprivacy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174748[]' id='answer-id-705428' class='answer   answerof-174748 ' value='705428'   \/><label for='answer-id-705428' id='answer-label-705428' class=' answer'><span>GDPR overrides all previous legislation on information handling, so new laws were needed to ensure authorities did not inadvertentlybreak the law.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174748[]' id='answer-id-705429' class='answer   answerof-174748 ' value='705429'   \/><label for='answer-id-705429' id='answer-label-705429' class=' answer'><span>Police could previously intercept without lawful authority any communications in the course of transmission through a public post ortelecoms system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174748[]' id='answer-id-705430' class='answer   answerof-174748 ' value='705430'   \/><label for='answer-id-705430' id='answer-label-705430' class=' answer'><span>Surveillance of a conversation or an online message by law enforcement agents was previously illegaldue to the 1950 version of the Human Rights Convention.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-174749'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Which algorithm is a current specification for the encryption of electronic data established by NIST?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='174749' \/><input type='hidden' id='answerType174749' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174749[]' id='answer-id-705431' class='answer   answerof-174749 ' value='705431'   \/><label for='answer-id-705431' id='answer-label-705431' class=' answer'><span>RS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174749[]' id='answer-id-705432' class='answer   answerof-174749 ' value='705432'   \/><label for='answer-id-705432' id='answer-label-705432' class=' answer'><span>AE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174749[]' id='answer-id-705433' class='answer   answerof-174749 ' value='705433'   \/><label for='answer-id-705433' id='answer-label-705433' class=' answer'><span>DE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174749[]' id='answer-id-705434' class='answer   answerof-174749 ' value='705434'   \/><label for='answer-id-705434' id='answer-label-705434' class=' answer'><span>PG<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-174750'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='174750' \/><input type='hidden' id='answerType174750' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174750[]' id='answer-id-705435' class='answer   answerof-174750 ' value='705435'   \/><label for='answer-id-705435' id='answer-label-705435' class=' answer'><span>Risk = Likelihood * Impact.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174750[]' id='answer-id-705436' class='answer   answerof-174750 ' value='705436'   \/><label for='answer-id-705436' id='answer-label-705436' class=' answer'><span>Risk = Likelihood \/ Impact.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174750[]' id='answer-id-705437' class='answer   answerof-174750 ' value='705437'   \/><label for='answer-id-705437' id='answer-label-705437' class=' answer'><span>Risk = Vulnerability \/ Threat.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174750[]' id='answer-id-705438' class='answer   answerof-174750 ' value='705438'   \/><label for='answer-id-705438' id='answer-label-705438' class=' answer'><span>Risk = Threat * Likelihood.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-174751'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>In a security governance framework, which of the following publications would be at the HIGHEST level?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='174751' \/><input type='hidden' id='answerType174751' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174751[]' id='answer-id-705439' class='answer   answerof-174751 ' value='705439'   \/><label for='answer-id-705439' id='answer-label-705439' class=' answer'><span>Procedures.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174751[]' id='answer-id-705440' class='answer   answerof-174751 ' value='705440'   \/><label for='answer-id-705440' id='answer-label-705440' class=' answer'><span>Standards<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174751[]' id='answer-id-705441' class='answer   answerof-174751 ' value='705441'   \/><label for='answer-id-705441' id='answer-label-705441' class=' answer'><span>Policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174751[]' id='answer-id-705442' class='answer   answerof-174751 ' value='705442'   \/><label for='answer-id-705442' id='answer-label-705442' class=' answer'><span>Guidelines<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-174752'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='174752' \/><input type='hidden' id='answerType174752' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174752[]' id='answer-id-705443' class='answer   answerof-174752 ' value='705443'   \/><label for='answer-id-705443' id='answer-label-705443' class=' answer'><span>Quality Assurance and Control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174752[]' id='answer-id-705444' class='answer   answerof-174752 ' value='705444'   \/><label for='answer-id-705444' id='answer-label-705444' class=' answer'><span>Dynamic verification.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174752[]' id='answer-id-705445' class='answer   answerof-174752 ' value='705445'   \/><label for='answer-id-705445' id='answer-label-705445' class=' answer'><span>Static verification.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174752[]' id='answer-id-705446' class='answer   answerof-174752 ' value='705446'   \/><label for='answer-id-705446' id='answer-label-705446' class=' answer'><span>Source code analysis.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-174753'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>How does network visualisation assist in managing information security?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='174753' \/><input type='hidden' id='answerType174753' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174753[]' id='answer-id-705447' class='answer   answerof-174753 ' value='705447'   \/><label for='answer-id-705447' id='answer-label-705447' class=' answer'><span>Visualisation can communicate large amounts of data in a manner that is a relatively simple way for people to analyse and interpret.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174753[]' id='answer-id-705448' class='answer   answerof-174753 ' value='705448'   \/><label for='answer-id-705448' id='answer-label-705448' class=' answer'><span>Visualisation provides structured tables and lists that can be analysed using common tools such as MS Excel.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174753[]' id='answer-id-705449' class='answer   answerof-174753 ' value='705449'   \/><label for='answer-id-705449' id='answer-label-705449' class=' answer'><span>Visualisation offers unstructured data that records the entirety of the data in a flat, filterable ftle format.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174753[]' id='answer-id-705450' class='answer   answerof-174753 ' value='705450'   \/><label for='answer-id-705450' id='answer-label-705450' class=' answer'><span>Visualisation software operates in a way that is rarely and thereby it is less prone to malware infection.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-174754'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>What type of attack could directly affect the confidentiality of an unencrypted VoIP network?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='174754' \/><input type='hidden' id='answerType174754' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174754[]' id='answer-id-705451' class='answer   answerof-174754 ' value='705451'   \/><label for='answer-id-705451' id='answer-label-705451' class=' answer'><span>Packet Sniffing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174754[]' id='answer-id-705452' class='answer   answerof-174754 ' value='705452'   \/><label for='answer-id-705452' id='answer-label-705452' class=' answer'><span>Brute Force Attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174754[]' id='answer-id-705453' class='answer   answerof-174754 ' value='705453'   \/><label for='answer-id-705453' id='answer-label-705453' class=' answer'><span>Ransomware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174754[]' id='answer-id-705454' class='answer   answerof-174754 ' value='705454'   \/><label for='answer-id-705454' id='answer-label-705454' class=' answer'><span>Vishing Attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-174755'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>What form of attack against an employee has the MOST impact on their compliance with the organisation's &quot;code of conduct&quot;?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='174755' \/><input type='hidden' id='answerType174755' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174755[]' id='answer-id-705455' class='answer   answerof-174755 ' value='705455'   \/><label for='answer-id-705455' id='answer-label-705455' class=' answer'><span>Brute Force Attack.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174755[]' id='answer-id-705456' class='answer   answerof-174755 ' value='705456'   \/><label for='answer-id-705456' id='answer-label-705456' class=' answer'><span>Social Engineering.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174755[]' id='answer-id-705457' class='answer   answerof-174755 ' value='705457'   \/><label for='answer-id-705457' id='answer-label-705457' class=' answer'><span>Ransomware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174755[]' id='answer-id-705458' class='answer   answerof-174755 ' value='705458'   \/><label for='answer-id-705458' id='answer-label-705458' class=' answer'><span>Denial of Service.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-174756'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which of the following uses are NOT usual ways that attackers have of leveraging botnets?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='174756' \/><input type='hidden' id='answerType174756' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174756[]' id='answer-id-705459' class='answer   answerof-174756 ' value='705459'   \/><label for='answer-id-705459' id='answer-label-705459' class=' answer'><span>Generating and distributing spam messages.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174756[]' id='answer-id-705460' class='answer   answerof-174756 ' value='705460'   \/><label for='answer-id-705460' id='answer-label-705460' class=' answer'><span>Conducting DDOS attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174756[]' id='answer-id-705461' class='answer   answerof-174756 ' value='705461'   \/><label for='answer-id-705461' id='answer-label-705461' class=' answer'><span>Scanning for system &amp; application vulnerabilities.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174756[]' id='answer-id-705462' class='answer   answerof-174756 ' value='705462'   \/><label for='answer-id-705462' id='answer-label-705462' class=' answer'><span>Undertaking vishing attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-174757'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Whatis the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='174757' \/><input type='hidden' id='answerType174757' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174757[]' id='answer-id-705463' class='answer   answerof-174757 ' value='705463'   \/><label for='answer-id-705463' id='answer-label-705463' class=' answer'><span>Whaling.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174757[]' id='answer-id-705464' class='answer   answerof-174757 ' value='705464'   \/><label for='answer-id-705464' id='answer-label-705464' class=' answer'><span>Spear-phishing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174757[]' id='answer-id-705465' class='answer   answerof-174757 ' value='705465'   \/><label for='answer-id-705465' id='answer-label-705465' class=' answer'><span>C-suite spamming.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174757[]' id='answer-id-705466' class='answer   answerof-174757 ' value='705466'   \/><label for='answer-id-705466' id='answer-label-705466' class=' answer'><span>Trawling.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-174758'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='174758' \/><input type='hidden' id='answerType174758' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174758[]' id='answer-id-705467' class='answer   answerof-174758 ' value='705467'   \/><label for='answer-id-705467' id='answer-label-705467' class=' answer'><span>TOGAF<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174758[]' id='answer-id-705468' class='answer   answerof-174758 ' value='705468'   \/><label for='answer-id-705468' id='answer-label-705468' class=' answer'><span>SABSA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174758[]' id='answer-id-705469' class='answer   answerof-174758 ' value='705469'   \/><label for='answer-id-705469' id='answer-label-705469' class=' answer'><span>PCI DS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174758[]' id='answer-id-705470' class='answer   answerof-174758 ' value='705470'   \/><label for='answer-id-705470' id='answer-label-705470' class=' answer'><span>OWAS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-174759'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Preventive.<\/div><input type='hidden' name='question_id[]' id='qID_17' value='174759' \/><input type='hidden' id='answerType174759' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174759[]' id='answer-id-705471' class='answer   answerof-174759 ' value='705471'   \/><label for='answer-id-705471' id='answer-label-705471' class=' answer'><span>1, 2 and 4.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174759[]' id='answer-id-705472' class='answer   answerof-174759 ' value='705472'   \/><label for='answer-id-705472' id='answer-label-705472' class=' answer'><span>1, 2 and 3.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174759[]' id='answer-id-705473' class='answer   answerof-174759 ' value='705473'   \/><label for='answer-id-705473' id='answer-label-705473' class=' answer'><span>1, 2 and 5.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174759[]' id='answer-id-705474' class='answer   answerof-174759 ' value='705474'   \/><label for='answer-id-705474' id='answer-label-705474' class=' answer'><span>3, 4 and 5.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-174760'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='174760' \/><input type='hidden' id='answerType174760' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174760[]' id='answer-id-705475' class='answer   answerof-174760 ' value='705475'   \/><label for='answer-id-705475' id='answer-label-705475' class=' answer'><span>Accountability.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174760[]' id='answer-id-705476' class='answer   answerof-174760 ' value='705476'   \/><label for='answer-id-705476' id='answer-label-705476' class=' answer'><span>Responsibility.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174760[]' id='answer-id-705477' class='answer   answerof-174760 ' value='705477'   \/><label for='answer-id-705477' id='answer-label-705477' class=' answer'><span>Credibility.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174760[]' id='answer-id-705478' class='answer   answerof-174760 ' value='705478'   \/><label for='answer-id-705478' id='answer-label-705478' class=' answer'><span>Confidentiality.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-174761'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='174761' \/><input type='hidden' id='answerType174761' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174761[]' id='answer-id-705479' class='answer   answerof-174761 ' value='705479'   \/><label for='answer-id-705479' id='answer-label-705479' class=' answer'><span>Ensure they are competent to be able to do so and be able to justify their actions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174761[]' id='answer-id-705480' class='answer   answerof-174761 ' value='705480'   \/><label for='answer-id-705480' id='answer-label-705480' class=' answer'><span>Ensure they are being observed by a senior investigator in all actions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174761[]' id='answer-id-705481' class='answer   answerof-174761 ' value='705481'   \/><label for='answer-id-705481' id='answer-label-705481' class=' answer'><span>Ensure they do not handle the evidence as that mustbe done by law enforcement officers.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174761[]' id='answer-id-705482' class='answer   answerof-174761 ' value='705482'   \/><label for='answer-id-705482' id='answer-label-705482' class=' answer'><span>Ensure the data has been adjusted to meet the investigation requirements.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-174762'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which of the following is NOT a valid statement to include in an organisation's security policy?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='174762' \/><input type='hidden' id='answerType174762' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174762[]' id='answer-id-705483' class='answer   answerof-174762 ' value='705483'   \/><label for='answer-id-705483' id='answer-label-705483' class=' answer'><span>The policy has the support of Board and the Chief Executive.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174762[]' id='answer-id-705484' class='answer   answerof-174762 ' value='705484'   \/><label for='answer-id-705484' id='answer-label-705484' class=' answer'><span>The policy has been agreed and amended to suit all third party contractors.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174762[]' id='answer-id-705485' class='answer   answerof-174762 ' value='705485'   \/><label for='answer-id-705485' id='answer-label-705485' class=' answer'><span>How the organisation will manage information assurance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174762[]' id='answer-id-705486' class='answer   answerof-174762 ' value='705486'   \/><label for='answer-id-705486' id='answer-label-705486' class=' answer'><span>The compliance with legal and regulatory obligations.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-174763'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Which of the following is NOT considered to be a form of computer misuse?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='174763' \/><input type='hidden' id='answerType174763' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174763[]' id='answer-id-705487' class='answer   answerof-174763 ' value='705487'   \/><label for='answer-id-705487' id='answer-label-705487' class=' answer'><span>Illegal retention of personal data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174763[]' id='answer-id-705488' class='answer   answerof-174763 ' value='705488'   \/><label for='answer-id-705488' id='answer-label-705488' class=' answer'><span>Illegal interception of information.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174763[]' id='answer-id-705489' class='answer   answerof-174763 ' value='705489'   \/><label for='answer-id-705489' id='answer-label-705489' class=' answer'><span>Illegal access to computer systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174763[]' id='answer-id-705490' class='answer   answerof-174763 ' value='705490'   \/><label for='answer-id-705490' id='answer-label-705490' class=' answer'><span>Downloading of pirated software.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-174764'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>What Is the PRIMARY reason for organisations obtaining outsourced managed security services?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='174764' \/><input type='hidden' id='answerType174764' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174764[]' id='answer-id-705491' class='answer   answerof-174764 ' value='705491'   \/><label for='answer-id-705491' id='answer-label-705491' class=' answer'><span>Managed security services permit organisations to absolve themselves of responsibility for security.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174764[]' id='answer-id-705492' class='answer   answerof-174764 ' value='705492'   \/><label for='answer-id-705492' id='answer-label-705492' class=' answer'><span>Managed security services are a de facto requirement for certification to core security standards such as ISG\/IEC 27001<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174764[]' id='answer-id-705493' class='answer   answerof-174764 ' value='705493'   \/><label for='answer-id-705493' id='answer-label-705493' class=' answer'><span>Managed security services provide access to specialist security tools and expertiseon a shared, cost-effective basis.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174764[]' id='answer-id-705494' class='answer   answerof-174764 ' value='705494'   \/><label for='answer-id-705494' id='answer-label-705494' class=' answer'><span>Managed security services are a powerful defence against litigation in the event of a security breach or incident<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-174765'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='174765' \/><input type='hidden' id='answerType174765' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174765[]' id='answer-id-705495' class='answer   answerof-174765 ' value='705495'   \/><label for='answer-id-705495' id='answer-label-705495' class=' answer'><span>The 'need to knownprinciple.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174765[]' id='answer-id-705496' class='answer   answerof-174765 ' value='705496'   \/><label for='answer-id-705496' id='answer-label-705496' class=' answer'><span>Verification of visitor's ID<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174765[]' id='answer-id-705497' class='answer   answerof-174765 ' value='705497'   \/><label for='answer-id-705497' id='answer-label-705497' class=' answer'><span>Appropriate behaviours.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174765[]' id='answer-id-705498' class='answer   answerof-174765 ' value='705498'   \/><label for='answer-id-705498' id='answer-label-705498' class=' answer'><span>Access denial measures<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-174766'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='174766' \/><input type='hidden' id='answerType174766' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174766[]' id='answer-id-705499' class='answer   answerof-174766 ' value='705499'   \/><label for='answer-id-705499' id='answer-label-705499' class=' answer'><span>Advanced Persistent Threat.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174766[]' id='answer-id-705500' class='answer   answerof-174766 ' value='705500'   \/><label for='answer-id-705500' id='answer-label-705500' class=' answer'><span>Trojan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174766[]' id='answer-id-705501' class='answer   answerof-174766 ' value='705501'   \/><label for='answer-id-705501' id='answer-label-705501' class=' answer'><span>Stealthware.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174766[]' id='answer-id-705502' class='answer   answerof-174766 ' value='705502'   \/><label for='answer-id-705502' id='answer-label-705502' class=' answer'><span>Zero-day.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-174767'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='174767' \/><input type='hidden' id='answerType174767' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174767[]' id='answer-id-705503' class='answer   answerof-174767 ' value='705503'   \/><label for='answer-id-705503' id='answer-label-705503' class=' answer'><span>System Integrity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174767[]' id='answer-id-705504' class='answer   answerof-174767 ' value='705504'   \/><label for='answer-id-705504' id='answer-label-705504' class=' answer'><span>Sandboxing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174767[]' id='answer-id-705505' class='answer   answerof-174767 ' value='705505'   \/><label for='answer-id-705505' id='answer-label-705505' class=' answer'><span>Intrusion Prevention System.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174767[]' id='answer-id-705506' class='answer   answerof-174767 ' value='705506'   \/><label for='answer-id-705506' id='answer-label-705506' class=' answer'><span>Defence in depth.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-174768'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Data Protection &amp; Privacy.<\/div><input type='hidden' name='question_id[]' id='qID_26' value='174768' \/><input type='hidden' id='answerType174768' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174768[]' id='answer-id-705507' class='answer   answerof-174768 ' value='705507'   \/><label for='answer-id-705507' id='answer-label-705507' class=' answer'><span>1, 2 and 3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174768[]' id='answer-id-705508' class='answer   answerof-174768 ' value='705508'   \/><label for='answer-id-705508' id='answer-label-705508' class=' answer'><span>3, 4 and 5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174768[]' id='answer-id-705509' class='answer   answerof-174768 ' value='705509'   \/><label for='answer-id-705509' id='answer-label-705509' class=' answer'><span>2, 3 and 4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174768[]' id='answer-id-705510' class='answer   answerof-174768 ' value='705510'   \/><label for='answer-id-705510' id='answer-label-705510' class=' answer'><span>1, 2 and 5<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-174769'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which of the following controls would be the MOST relevant and effective in detecting zero <br \/>\r<br>day attacks?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='174769' \/><input type='hidden' id='answerType174769' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174769[]' id='answer-id-705511' class='answer   answerof-174769 ' value='705511'   \/><label for='answer-id-705511' id='answer-label-705511' class=' answer'><span>Strong OS patch management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174769[]' id='answer-id-705512' class='answer   answerof-174769 ' value='705512'   \/><label for='answer-id-705512' id='answer-label-705512' class=' answer'><span>Vulnerability assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174769[]' id='answer-id-705513' class='answer   answerof-174769 ' value='705513'   \/><label for='answer-id-705513' id='answer-label-705513' class=' answer'><span>Signature-based intrusion detection.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174769[]' id='answer-id-705514' class='answer   answerof-174769 ' value='705514'   \/><label for='answer-id-705514' id='answer-label-705514' class=' answer'><span>Anomaly based intrusion detection.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-174770'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='174770' \/><input type='hidden' id='answerType174770' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174770[]' id='answer-id-705515' class='answer   answerof-174770 ' value='705515'   \/><label for='answer-id-705515' id='answer-label-705515' class=' answer'><span>ISO\/IEC 27001.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174770[]' id='answer-id-705516' class='answer   answerof-174770 ' value='705516'   \/><label for='answer-id-705516' id='answer-label-705516' class=' answer'><span>Qualitative.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174770[]' id='answer-id-705517' class='answer   answerof-174770 ' value='705517'   \/><label for='answer-id-705517' id='answer-label-705517' class=' answer'><span>CPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174770[]' id='answer-id-705518' class='answer   answerof-174770 ' value='705518'   \/><label for='answer-id-705518' id='answer-label-705518' class=' answer'><span>Quantitative<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-174771'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Which of the following cloud delivery models is NOT intrinsically &quot;trusted&quot; in terms of security by clients using the service?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='174771' \/><input type='hidden' id='answerType174771' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174771[]' id='answer-id-705519' class='answer   answerof-174771 ' value='705519'   \/><label for='answer-id-705519' id='answer-label-705519' class=' answer'><span>Public.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174771[]' id='answer-id-705520' class='answer   answerof-174771 ' value='705520'   \/><label for='answer-id-705520' id='answer-label-705520' class=' answer'><span>Private.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174771[]' id='answer-id-705521' class='answer   answerof-174771 ' value='705521'   \/><label for='answer-id-705521' id='answer-label-705521' class=' answer'><span>Hybrid.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174771[]' id='answer-id-705522' class='answer   answerof-174771 ' value='705522'   \/><label for='answer-id-705522' id='answer-label-705522' class=' answer'><span>Community<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-174772'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>Which of the following is MOST LIKELY to be described as a consequential loss?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='174772' \/><input type='hidden' id='answerType174772' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174772[]' id='answer-id-705523' class='answer   answerof-174772 ' value='705523'   \/><label for='answer-id-705523' id='answer-label-705523' class=' answer'><span>Reputation damage.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174772[]' id='answer-id-705524' class='answer   answerof-174772 ' value='705524'   \/><label for='answer-id-705524' id='answer-label-705524' class=' answer'><span>Monetary theft.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174772[]' id='answer-id-705525' class='answer   answerof-174772 ' value='705525'   \/><label for='answer-id-705525' id='answer-label-705525' class=' answer'><span>Service disruption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174772[]' id='answer-id-705526' class='answer   answerof-174772 ' value='705526'   \/><label for='answer-id-705526' id='answer-label-705526' class=' answer'><span>Processing errors.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-174773'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='174773' \/><input type='hidden' id='answerType174773' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174773[]' id='answer-id-705527' class='answer   answerof-174773 ' value='705527'   \/><label for='answer-id-705527' id='answer-label-705527' class=' answer'><span>Dynamic Testing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174773[]' id='answer-id-705528' class='answer   answerof-174773 ' value='705528'   \/><label for='answer-id-705528' id='answer-label-705528' class=' answer'><span>Static Testing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174773[]' id='answer-id-705529' class='answer   answerof-174773 ' value='705529'   \/><label for='answer-id-705529' id='answer-label-705529' class=' answer'><span>User Testing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174773[]' id='answer-id-705530' class='answer   answerof-174773 ' value='705530'   \/><label for='answer-id-705530' id='answer-label-705530' class=' answer'><span>Penetration Testing.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-174774'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always betaken into consideration?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='174774' \/><input type='hidden' id='answerType174774' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174774[]' id='answer-id-705531' class='answer   answerof-174774 ' value='705531'   \/><label for='answer-id-705531' id='answer-label-705531' class=' answer'><span>Spear Phishing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174774[]' id='answer-id-705532' class='answer   answerof-174774 ' value='705532'   \/><label for='answer-id-705532' id='answer-label-705532' class=' answer'><span>Shoulder Surfing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174774[]' id='answer-id-705533' class='answer   answerof-174774 ' value='705533'   \/><label for='answer-id-705533' id='answer-label-705533' class=' answer'><span>Dumpster Diving.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174774[]' id='answer-id-705534' class='answer   answerof-174774 ' value='705534'   \/><label for='answer-id-705534' id='answer-label-705534' class=' answer'><span>Tailgating.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-174775'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>One traditional use of a SIEM appliance is to monitor for exceptions received via syslog. <br \/>\r<br>What system from the following does NOT natively support syslog events?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='174775' \/><input type='hidden' id='answerType174775' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174775[]' id='answer-id-705535' class='answer   answerof-174775 ' value='705535'   \/><label for='answer-id-705535' id='answer-label-705535' class=' answer'><span>Enterprise Wireless Access Point.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174775[]' id='answer-id-705536' class='answer   answerof-174775 ' value='705536'   \/><label for='answer-id-705536' id='answer-label-705536' class=' answer'><span>Windows Desktop Systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174775[]' id='answer-id-705537' class='answer   answerof-174775 ' value='705537'   \/><label for='answer-id-705537' id='answer-label-705537' class=' answer'><span>Linux Web Server Appliances.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174775[]' id='answer-id-705538' class='answer   answerof-174775 ' value='705538'   \/><label for='answer-id-705538' id='answer-label-705538' class=' answer'><span>Enterprise Stateful Firewall.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-174776'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='174776' \/><input type='hidden' id='answerType174776' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174776[]' id='answer-id-705539' class='answer   answerof-174776 ' value='705539'   \/><label for='answer-id-705539' id='answer-label-705539' class=' answer'><span>Online retailer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174776[]' id='answer-id-705540' class='answer   answerof-174776 ' value='705540'   \/><label for='answer-id-705540' id='answer-label-705540' class=' answer'><span>Traditional market trader.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174776[]' id='answer-id-705541' class='answer   answerof-174776 ' value='705541'   \/><label for='answer-id-705541' id='answer-label-705541' class=' answer'><span>Mail delivery business.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-174776[]' id='answer-id-705542' class='answer   answerof-174776 ' value='705542'   \/><label for='answer-id-705542' id='answer-label-705542' class=' answer'><span>Agricultural producer.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-174777'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmitcredit card data?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='174777' \/><input type='hidden' id='answerType174777' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174777[]' id='answer-id-705543' class='answer   answerof-174777 ' value='705543'   \/><label for='answer-id-705543' id='answer-label-705543' class=' answer'><span>PCI DS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174777[]' id='answer-id-705544' class='answer   answerof-174777 ' value='705544'   \/><label for='answer-id-705544' id='answer-label-705544' class=' answer'><span>TOGA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174777[]' id='answer-id-705545' class='answer   answerof-174777 ' value='705545'   \/><label for='answer-id-705545' id='answer-label-705545' class=' answer'><span>ENISA NI<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-174777[]' id='answer-id-705546' class='answer   answerof-174777 ' value='705546'   \/><label for='answer-id-705546' id='answer-label-705546' class=' answer'><span>Sarbanes-Oxiey<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-36'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons5317\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"5317\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-06 09:07:43\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778058463\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"174743:705407,705408,705409,705410 | 174744:705411,705412,705413,705414 | 174745:705415,705416,705417,705418 | 174746:705419,705420,705421,705422 | 174747:705423,705424,705425,705426 | 174748:705427,705428,705429,705430 | 174749:705431,705432,705433,705434 | 174750:705435,705436,705437,705438 | 174751:705439,705440,705441,705442 | 174752:705443,705444,705445,705446 | 174753:705447,705448,705449,705450 | 174754:705451,705452,705453,705454 | 174755:705455,705456,705457,705458 | 174756:705459,705460,705461,705462 | 174757:705463,705464,705465,705466 | 174758:705467,705468,705469,705470 | 174759:705471,705472,705473,705474 | 174760:705475,705476,705477,705478 | 174761:705479,705480,705481,705482 | 174762:705483,705484,705485,705486 | 174763:705487,705488,705489,705490 | 174764:705491,705492,705493,705494 | 174765:705495,705496,705497,705498 | 174766:705499,705500,705501,705502 | 174767:705503,705504,705505,705506 | 174768:705507,705508,705509,705510 | 174769:705511,705512,705513,705514 | 174770:705515,705516,705517,705518 | 174771:705519,705520,705521,705522 | 174772:705523,705524,705525,705526 | 174773:705527,705528,705529,705530 | 174774:705531,705532,705533,705534 | 174775:705535,705536,705537,705538 | 174776:705539,705540,705541,705542 | 174777:705543,705544,705545,705546\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"174743,174744,174745,174746,174747,174748,174749,174750,174751,174752,174753,174754,174755,174756,174757,174758,174759,174760,174761,174762,174763,174764,174765,174766,174767,174768,174769,174770,174771,174772,174773,174774,174775,174776,174777\";\nWatuPROSettings[5317] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 5317;\t    \nWatuPRO.post_id = 22378;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.50752200 1778058463\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(5317);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[255,12218],"tags":[12211,12212,12213,12215,12217,12214],"class_list":["post-22378","post","type-post","status-publish","format-standard","hentry","category-bcs","category-information-security-and-ccp-scheme-certifications","tag-cismp-v9","tag-cismp-v9-dumps","tag-cismp-v9-dumps-questions","tag-cismp-v9-exam-dumps","tag-cismp-v9-exam-questions","tag-cismp-v9-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/22378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=22378"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/22378\/revisions"}],"predecessor-version":[{"id":22380,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/22378\/revisions\/22380"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=22378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=22378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=22378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}