100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISMP V9 Example Questions With Complete Solutions | 2024/2025 | 100% Pass

Rating
-
Sold
-
Pages
55
Grade
A+
Uploaded on
20-10-2024
Written in
2024/2025

CISMP V9 Example Questions With Complete Solutions | 2024/2025 | 100% Pass What is the primary goal of information security? A) To eliminate all security risks B) To manage and mitigate risks to an acceptable level C) To ensure all employees follow security protocols D) To prevent unauthorized access to the internet B) To manage and mitigate risks to an acceptable level Which of the following is a key component of an effective security policy? A) Complexity and length B) Clarity and enforceability C) Exclusivity for IT staff only D) General guidelines without specifics B) Clarity and enforceability What does the acronym "CIA" in information security stand for? 2 A) Confidentiality, Integrity, Accessibility B) Compliance, Integrity, Audit C) Confidentiality, Integrity, Availability D) Control, Integrity, Availability C) Confidentiality, Integrity, Availability Which framework provides guidelines for establishing an Information Security Management System (ISMS)? A) COBIT B) NIST C) ISO/IEC 27001 D) ITIL C) ISO/IEC 27001 What is the purpose of a risk assessment in information security? A) To identify assets B) To evaluate the effectiveness of security policies C) To identify and evaluate risks 3 D) To develop incident response plans C) To identify and evaluate risks Which of the following is an example of a physical security control? A) Passwords B) Firewalls C) Security cameras D) Data encryption C) Security cameras

Show more Read less
Institution
CISMP V9
Course
CISMP V9











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISMP V9
Course
CISMP V9

Document information

Uploaded on
October 20, 2024
Number of pages
55
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISMP V9 Example Questions With
Complete Solutions | 2024/2025 | 100%
Pass
What is the primary goal of information security?

A) To eliminate all security risks

B) To manage and mitigate risks to an acceptable level

C) To ensure all employees follow security protocols

D) To prevent unauthorized access to the internet


✔✔ B) To manage and mitigate risks to an acceptable level




Which of the following is a key component of an effective security policy?

A) Complexity and length

B) Clarity and enforceability

C) Exclusivity for IT staff only

D) General guidelines without specifics


✔✔ B) Clarity and enforceability




What does the acronym "CIA" in information security stand for?


1

,A) Confidentiality, Integrity, Accessibility

B) Compliance, Integrity, Audit

C) Confidentiality, Integrity, Availability

D) Control, Integrity, Availability


✔✔ C) Confidentiality, Integrity, Availability




Which framework provides guidelines for establishing an Information Security Management

System (ISMS)?

A) COBIT

B) NIST

C) ISO/IEC 27001

D) ITIL


✔✔ C) ISO/IEC 27001




What is the purpose of a risk assessment in information security?

A) To identify assets

B) To evaluate the effectiveness of security policies

C) To identify and evaluate risks



2

,D) To develop incident response plans


✔✔ C) To identify and evaluate risks




Which of the following is an example of a physical security control?

A) Passwords

B) Firewalls

C) Security cameras

D) Data encryption


✔✔ C) Security cameras




What type of attack involves overwhelming a system to disrupt services?

A) Phishing

B) Denial of Service (DoS)

C) Man-in-the-Middle

D) Social Engineering


✔✔ B) Denial of Service (DoS)




What is the role of security awareness training for employees?


3

, A) To promote software use

B) To enhance knowledge of security threats

C) To teach coding skills

D) To reduce the need for IT staff


✔✔ B) To enhance knowledge of security threats




What is a security incident?

A) A planned audit of security protocols

B) Any event that compromises the integrity of information

C) Regular updates to security software

D) A security awareness seminar


✔✔ B) Any event that compromises the integrity of information




How often should security policies be reviewed?

A) Every five years

B) Only when a security breach occurs

C) Regularly, at least annually

D) Never, once created


4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SterlingScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
424
Member since
1 year
Number of followers
41
Documents
12200
Last sold
8 hours ago
Boost Your Brilliance: Document Spot

Welcome to my shop! My shop is your one-stop destination for unlocking your full potential. Inside, you\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'ll find a treasure collection of resources prepared to help you reach new heights. Whether you\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'re a student, professional, or lifelong learner, my collection of documents is designed to empower you on your academic journey. Each document is a key to unlocking your capabilities and achieving your goals. Step into my shop today and embark on the path to maximizing your potential!

Read more Read less
4.1

89 reviews

5
53
4
12
3
12
2
4
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions