CISMP MOCK EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS VERIFIED LATEST UPDATE
13 views 0 purchase
Course
CISMP
Institution
CISMP
CISMP MOCK EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS VERIFIED LATEST UPDATE
When choosing a technical product to protect classified information it is BEST to select one which has been
Evaluated against the Common Criteria
If an Email message is NOT from the sender it claims to be from...
cismp mock exam questions and answers with complet
Written for
CISMP
All documents for this subject (43)
Seller
Follow
NurseAdvocate
Reviews received
Content preview
CISMP MOCK EXAM QUESTIONS AND ANSWERS WITH
COMPLETE SOLUTIONS VERIFIED LATEST UPDATE
When choosing a technical product to protect classified information it is BEST to
select one which has been
Evaluated against the Common Criteria
If an Email message is NOT from the sender it claims to be from, this is known as
Repudiating
A Hash may be defined as
A message digest calculated from a set of data
Why should security incidents be reported as quickly as possible
To limit damage or loss
Bob needs to send an email to Alice and be confident that it will arrive unaltered.
Alice needs to ensure that the email has come from Bob. Which would be used?
Bobs Private Key
A Trojan Horse is
Code which is maliciously introduced into executable code
Which of the following would be a principle element of the BCP process?
Identification and Prioritisation of critical business processes
When implementing Information Security Standards, it is crucial to gain support
from whom?
Senior Executives
, When would there be a requirement to report a security incident to law
enforcement agencies?
When local legislation determines it as a requirement
Bob, an employee has developed an application during company working hours,
which is relevant to the business but not directly related to Bobs employment.
Who owns the intellectual property rights?
The Employer
Which of the following is most likely to cause a threat to be treated with a higher
priority?
Business Impact Analysis
In order to gain access to a computer operating system, the computer system
must
Request a User ID and Password to enable logon rights
System Security Test and Evaluation Plans SHOULD be set out by
Information Security Team, System Developers and relevant Operational Staff
Why would a document be classified as Top Secret? (Choose all that apply)
So that users understand the level of Confidentiality
So that users understand how to use the document
So that Users understand how to dispose of the document
Phishing is an attempt to collect personal data by using which primary means?
Email Systems
Privileged User Rights to a computer system should be made available to:
Authorised personnel on a needs basis
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseAdvocate. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.09. You're not tied to anything after your purchase.