BCS
CISMP-V9
Q1:
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
○
A
Recorder.○
B
Desk secretary.○
C
Scribe.○
D
Scrum Master.
BCS
CISMP-V9
Q2:
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?
○
A
End-to-end testing.○
B
Non-dynamic modeling○
C
Desk-top exercise.○
D
Fault stressing
BCS
CISMP-V9
Q3:
How does network visualisation assist in managing information security?
○
A
Visualisation can communicate large amounts of data in a manner that is a relatively simple way for people to analyse and interpret.○
B
Visualisation provides structured tables and lists that can be analysed using common tools such as MS Excel.○
C
Visualisation offers unstructured data that records the entirety of the data in a flat, filterable ftle format.○
D
Visualisation software operates in a way that is rarely and thereby it is less prone to malware infection.
BCS
CISMP-V9
Q4:
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
○
A
Confidentiality.○
B
Integrity.○
C
Availability.○
D
Authenticity.
BCS
CISMP-V9
Q5:
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
○
A
Threat trees.○
B
STRIDE charts.○
C
Misuse case diagrams.○
D
DREAD diagrams.