BCS Related Exams
CISMP-V9 Exam

Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?