Question 7

When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

Correct Answer:C

Question 8

What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?

Correct Answer:C

Question 9

When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?

Correct Answer:A

Question 10

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

Correct Answer:D
https://en.wikipedia.org/wiki/Defense_in_depth_(computing)

Question 11

Which of the following is NOT a valid statement to include in an organisation's security policy?

Correct Answer:C

Question 12

What type of attack could directly affect the confidentiality of an unencrypted VoIP network?

Correct Answer:B

START CISMP-V9 EXAM