• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CISMP ACTUAL EXAM Updated Questions with correct

Exam (elaborations) Dec 14, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

pg. 1 CISMP ACTUAL EXAM/ Updated Questions with correct Answers/ Advanced

Which three of the following characteristics form the AAA Triad in Information Security?

  • Authentication
  • Availability
  • Accounting
  • Asymmetry
  • Authorization
  • Correct Answer -1. Authentication

  • Accounting
  • Authorization

Which of the following is NOT an accepted classification of security controls?

  • Nominative.
  • Preventive.
  • Detective.
  • Corrective
  • Correct Answer -A. Nominative.

According to ISO/IEC 27000, which of the following is the definition of a vulnerability?

  • A weakness of an asset or group of assets that can be exploited by one or more threats.
  • The impact of a cyber attack on an asset or group of assets. 1 / 4

pg. 2

  • The threat that an asset or group of assets may be damaged by an exploit. D. The damage that has
  • been caused by a weakness in a system.Correct Answer -A. A weakness of an asset or group of assets that can be exploited by one or more threats.

Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?

  • Accountability.
  • Responsibility.
  • Credibility.
  • Confidentiality.
  • Correct Answer -A. Accountability.

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

  • System Integrity.
  • Sandboxing.
  • Intrusion Prevention System.
  • Defence in depth.
  • Correct Answer -D. Defence in depth.

Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?

  • Online retailer.
  • Traditional market trader.
  • Mail delivery business.
  • Agricultural producer
  • Correct Answer -A. Online retailer. 2 / 4

pg. 3

Which types of organisations are likely to be the target of DDoS attacks?

  • Cloud service providers.
  • Any financial sector organisations.
  • Online retail based organisations.
  • Any organisation with an online presence.
  • Correct Answer -D. Any organisation with an online presence.

In a security governance framework, which of the following publications would be at the HIGHEST level?

  • Procedures.
  • Standards
  • Policy.
  • Guidelines
  • Correct Answer -C. Policy.

Which of the following is LEAST LIKELY to be the result of a global pandemic impacting on information security?

  • A large increase in remote workers operating in insecure premises.
  • Additional physical security requirements at data centres and corporate headquarters.
  • Increased demand on service desks as users need additional tools such as VPNs.
  • An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.
  • Correct Answer -C. Increased demand on service desks as users need additional tools such as VPNs.

In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?

  • / 4

pg. 4

  • Once defined, they do not need reviewing.
  • A maximum of once every other month.
  • When the next risk audit is due.
  • Risks remain under constant review.
  • Correct Answer -D. Risks remain under constant review.

Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?

  • Advanced Persistent Threat.
  • Trojan.
  • Stealthware.
  • Zero-day.
  • Correct Answer -D. Zero-day.

Which of the following is MOST LIKELY to be described as a consequential loss?

  • Reputation damage.
  • Monetary theft.
  • Service disruption.
  • Processing errors.
  • Correct Answer -A. Reputation damage.

Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?

  • Use of 'cheap" microcontroller-based sensors.
  • Much larger attack surface than traditional IT systems.
  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

This document provided in-depth analysis, which enhanced my understanding. Absolutely remarkable!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Exam (elaborations)
Added: Dec 14, 2025
Description:

pg. 1 CISMP ACTUAL EXAM/ Updated Questions with correct Answers/ Advanced Which three of the following characteristics form the AAA Triad in Information Security? 1. Authentication 2. Availability ...

Unlock Now
$ 1.00