CISMP-V9試験無料問題集「BCS Foundation Certificate in Information Security Management Principles V9.0 認定」

What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?

解説: (GoShiken メンバーにのみ表示されます)
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is an asymmetric encryption algorithm?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is NOT an information security specific vulnerability?

解説: (GoShiken メンバーにのみ表示されます)
Which algorithm is a current specification for the encryption of electronic data established by NIST?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.

解説: (GoShiken メンバーにのみ表示されます)
What does a penetration test do that a Vulnerability Scan does NOT?

解説: (GoShiken メンバーにのみ表示されます)
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?

解説: (GoShiken メンバーにのみ表示されます)
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?

解説: (GoShiken メンバーにのみ表示されます)