pg. 1 CISMP ACTUAL EXAM/ Updated Questions with correct Answers/ Advanced
Which three of the following characteristics form the AAA Triad in Information Security?
- Authentication
- Availability
- Accounting
- Asymmetry
- Authorization
- Accounting
- Authorization
Correct Answer -1. Authentication
Which of the following is NOT an accepted classification of security controls?
- Nominative.
- Preventive.
- Detective.
- Corrective
Correct Answer -A. Nominative.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
- A weakness of an asset or group of assets that can be exploited by one or more threats.
- The impact of a cyber attack on an asset or group of assets. 1 / 4
pg. 2
- The threat that an asset or group of assets may be damaged by an exploit. D. The damage that has
been caused by a weakness in a system.Correct Answer -A. A weakness of an asset or group of assets that can be exploited by one or more threats.
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
- Accountability.
- Responsibility.
- Credibility.
- Confidentiality.
Correct Answer -A. Accountability.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
- System Integrity.
- Sandboxing.
- Intrusion Prevention System.
- Defence in depth.
Correct Answer -D. Defence in depth.
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
- Online retailer.
- Traditional market trader.
- Mail delivery business.
- Agricultural producer
Correct Answer -A. Online retailer. 2 / 4
pg. 3
Which types of organisations are likely to be the target of DDoS attacks?
- Cloud service providers.
- Any financial sector organisations.
- Online retail based organisations.
- Any organisation with an online presence.
Correct Answer -D. Any organisation with an online presence.
In a security governance framework, which of the following publications would be at the HIGHEST level?
- Procedures.
- Standards
- Policy.
- Guidelines
Correct Answer -C. Policy.
Which of the following is LEAST LIKELY to be the result of a global pandemic impacting on information security?
- A large increase in remote workers operating in insecure premises.
- Additional physical security requirements at data centres and corporate headquarters.
- Increased demand on service desks as users need additional tools such as VPNs.
- An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.
Correct Answer -C. Increased demand on service desks as users need additional tools such as VPNs.
In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?
- / 4
pg. 4
- Once defined, they do not need reviewing.
- A maximum of once every other month.
- When the next risk audit is due.
- Risks remain under constant review.
Correct Answer -D. Risks remain under constant review.
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
- Advanced Persistent Threat.
- Trojan.
- Stealthware.
- Zero-day.
Correct Answer -D. Zero-day.
Which of the following is MOST LIKELY to be described as a consequential loss?
- Reputation damage.
- Monetary theft.
- Service disruption.
- Processing errors.
Correct Answer -A. Reputation damage.
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
- Use of 'cheap" microcontroller-based sensors.
- Much larger attack surface than traditional IT systems.
- / 4