Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
A. TOGAF
B. SABSA
C. PCI DSS.
D. OWASP.
What Is the PRIMARY difference between DevOps and DevSecOps?
A. Within DevSecOps security is introduced at the end of development immediately prior to deployment.
B. DevSecOps focuses solely on iterative development cycles.
C. DevSecOps includes security on the same level as continuous integration and delivery.
D. DevOps mandates that security is integrated at the beginning of the development lifecycle.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
A. Data Deletion.
B. Data Archiving.
C. Data Storage.
D. Data Publication
Which of the following is often the final stage in the information management lifecycle?
A. Disposal.
B. Creation.
C. Use.
D. Publication.
Which standard deals with the implementation of business continuity?
A. ISO/IEC 27001
B. COBIT
C. IS0223G1.
D. BS5750.
The policies, processes, practices, and tools used to align the business value of information with the most
appropriate and cost-effective infrastructure from the time information is conceived through its final
disposition.
Which of the below business practices does this statement define?
A. Information Lifecycle Management.
B. Information Quality Management.
C. Total Quality Management.
D. Business Continuity Management.
Which of the following international standards deals with the retention of records?
A. PCI DSS.
B. RFC1918.
C. IS015489.
D. ISO/IEC 27002.
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?
A. PCI DSS.
B. TOGAF.
C. ENISA NIS.
D. Sarbanes-Oxiey
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
A. ITIL.
B. SABSA.
C. COBIT
D. ISAGA.
Which of the following is NOT considered to be a form of computer misuse?
A. Illegal retention of personal data.
B. Illegal interception of information.
C. Illegal access to computer systems.
D. Downloading of pirated software.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only BCS exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CISMP-V9 exam preparations and BCS certification application, do not hesitate to visit our Vcedump.com to find your solutions here.