Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
Answer(s): D
https://en.wikipedia.org/wiki/Zero-day_(computing)
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer(s): A
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Which of the following is NOT an information security specific vulnerability?
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
Share your comments for BCS CISMP-V9 exam with other users:
the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.