Free BCS CISMP-V9 Exam Actual Questions

The questions for CISMP-V9 were last updated On Dec 19, 2024

Question No. 1

Which types of organisations are likely to be the target of DDoS attacks?

Show Answer Hide Answer
Correct Answer: D

Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.


Question No. 2

Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?

Show Answer Hide Answer
Correct Answer: A

In the context of a cloud service provision, particularly Infrastructure as a Service (IaaS), the focus is typically on providing the physical or virtual infrastructure to the customer. The responsibility for user security education generally falls within the domain of the customer, as it pertains to their internal operations and how their employees or users interact with the IaaS. The IaaS provider's responsibilities are more aligned with ensuring the security of the infrastructure itself, rather than the education of users on security practices.

Intellectual Property Rights (B), End-of-service , and Liability (D) are all common considerations in cloud service contracts. Intellectual Property Rights would cover the ownership of data and software used within the service. End-of-service terms would outline the process and responsibilities when the service term ends, including data retrieval or transfer. Liability clauses would define the extent to which the provider is responsible for damages or losses incurred due to service issues.


Question No. 3

Which of the following is NOT an information security specific vulnerability?

Show Answer Hide Answer
Correct Answer: C

In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:

A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.

B: An unpatched Windows operating system could have known security flaws that can be exploited.

D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.

Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.


Question No. 5

Which of the following uses are NOT usual ways that attackers have of leveraging botnets?

Show Answer Hide Answer
Correct Answer: D

Botnets are typically used by attackers for a variety of malicious activities, most commonly for:

Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.

Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.

Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.

However,vishing attacks, which involve voice phishing through phone calls, are not commonly associated with the use of botnets.Vishing typically involves direct voice communication to trick individuals into divulging sensitive information and does not leverage the distributed computing power of botnets, which is central to their usual applications such as spam distribution, DDoS attacks, and vulnerability scanning123.