Free BCS CISMP-V9 Exam Actual Questions

The questions for CISMP-V9 were last updated On May 1, 2024

Question No. 2

When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?

Show Answer Hide Answer
Question No. 3

When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?

Show Answer Hide Answer
Correct Answer: A

When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.


Question No. 5

Which of the following is an asymmetric encryption algorithm?

Show Answer Hide Answer
Correct Answer: D

RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.