Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! CISSP-ISSMP has been withdrawn.

CISSP-ISSMP Practice Exam Questions with Answers ISSMP: Information Systems Security Management Professional Certification

Question # 6

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.

Preparation

B.

Eradication

C.

Identification

D.

Containment

Full Access
Question # 7

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.

A.

Editor

B.

Custodian

C.

Owner

D.

Security auditor

E.

User

Full Access
Question # 8

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

A.

Programming and training

B.

Evaluation and acceptance

C.

Definition

D.

Initiation

Full Access
Question # 9

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

A.

Shielding

B.

Spoofing

C.

Eavesdropping

D.

Packaging

Full Access
Question # 10

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

A.

It provides object, orient, decide and act strategy.

B.

It provides a live documentation of the project.

C.

It provides the risk analysis of project configurations.

D.

It provides the versions for network devices.

Full Access
Question # 11

Which of the following relies on a physical characteristic of the user to verify his identity?

A.

Social Engineering

B.

Kerberos v5

C.

Biometrics

D.

CHAP

Full Access
Question # 12

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?

A.

Containment

B.

Eradication

C.

Preparation

D.

Identification

Full Access
Question # 13

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Safeguard

B.

Single Loss Expectancy (SLE)

C.

Exposure Factor (EF)

D.

Annualized Rate of Occurrence (ARO)

Full Access
Question # 14

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

A.

Mitigation

B.

Sharing

C.

Acceptance

D.

Transference

Full Access
Question # 15

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

Phishing

B.

Wiretapping

C.

SMB signing

D.

Spoofing

Full Access
Question # 16

Which of the following subphases are defined in the maintenance phase of the life cycle models?

A.

Change control

B.

Configuration control

C.

Request control

D.

Release control

Full Access
Question # 17

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Copyright

B.

Trademark

C.

Trade secret

D.

Patent

Full Access
Question # 18

Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?

A.

CSIRT

B.

CERT

C.

FIRST

D.

FedCIRC

Full Access
Question # 19

Which of the following processes is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

A.

Risk management

B.

Configuration management

C.

Change management

D.

Procurement management

Full Access
Question # 20

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps? Each correct answer represents a complete solution. Choose two.

A.

Awareness and Training Material Effectiveness

B.

Awareness and Training Material Development

C.

Awareness and Training Material Implementation

D.

Awareness and Training Program Design

Full Access
Question # 21

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

A.

Protect an organization from major computer services failure.

B.

Minimizethe risk to the organization from delays in providing services.

C.

Guarantee the reliability of standby systems through testing and simulation.

D.

Maximize the decision-making required by personnel during a disaster.

Full Access
Question # 22

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Separation of duties

B.

Account lockout policy

C.

Incident response policy

D.

Chain of custody

Full Access
Question # 23

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project contractual relationship with the vendor

B.

Project management plan

C.

Project communications plan

D.

Project scope statement

Full Access
Question # 24

Which of the following statements best explains how encryption works on the Internet?

A.

Encryption encodes information using specific algorithms with a string of numbers known as a key.

B.

Encryption validates a username and passwordbefore sending information to the Web server.

C.

Encryption allows authorized users to access Web sites that offer online shopping.

D.

Encryption helps in transaction processing by e-commerce servers on the Internet.

Full Access
Question # 25

Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?

A.

Vulnerability analysis

B.

Cost-benefit analysis

C.

Gap analysis

D.

Requirementanalysis

Full Access
Question # 26

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

A.

SLA

B.

NDA

C.

Non-price competition

D.

CNC

Full Access
Question # 27

Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due?

A.

Expected breach

B.

Actual breach

C.

Anticipatory breach

D.

Nonperforming breach

Full Access
Question # 28

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

A.

Business continuity plan development

B.

Business impact assessment

C.

Scope and plan initiation

D.

Plan approval and implementation

Full Access
Question # 29

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

A.

TCP port 80

B.

TCP port 25

C.

UDP port 161

D.

TCP port 110

Full Access
Question # 30

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

A.

It ensures that unauthorized modifications are not made to data by authorized personnel orprocesses.

B.

It determines the actions and behaviors of a single individual within a system

C.

It ensures that modifications are not made to data by unauthorized personnel or processes.

D.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

Full Access
Question # 31

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.

Network security policy

B.

Backup policy

C.

Privacy policy

D.

User password policy

Full Access
Question # 32

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

A.

OPSEC assessment

Full Access