Free CISMP-V9 Exam Dumps

Question 16

In a security governance framework, which of the following publications would be at the HIGHEST level?

Correct Answer:A

Question 17

Which algorithm is a current specification for the encryption of electronic data established by NIST?

Correct Answer:B
https://www.nist.gov/publications/advanced-encryption-standard-aes

Question 18

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?

Correct Answer:A

Question 19

A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requestsonTCP ports 22, 80, 443, 3306and 8080.
What type of device has MOST LIKELY been discovered?

Correct Answer:A

Question 20

What are the different methods that can be used as access controls?
* 1. Detective.
* 2. Physical.
* 3. Reactive.
* 4. Virtual.
* 5. Preventive.

Correct Answer:C