Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISSMP PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISSMP PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISSMPĀ®: Information Systems Security Management Professional
  • Last Update: Sep 12, 2025
  • Questions and Answers: 218
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISSMP Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISSMP Practice Exam Questions with Answers ISSMPĀ®: Information Systems Security Management Professional Certification

Question # 6

Which of the following policies helps reduce the potential damage from the actions of one person?

A.

CSA

B.

Risk assessment

C.

Separation of duties

D.

Internal audit

Full Access
Question # 7

Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?

A.

Cold sites

B.

Orange sites

C.

Warm sites

D.

Duplicate processing facilities

Full Access
Question # 8

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

A.

Direct

B.

Circumstantial

C.

Incontrovertible

D.

Corroborating

Full Access
Question # 9

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

A.

NSA-IAM

B.

DITSCAP

C.

ASSET

D.

NIACAP

Full Access
Question # 10

You are the project manager of the NGQQ Project for your company. To help you communicate project status to your stakeholders, you are going to create a stakeholder register. All of the following information should be included in the stakeholder register except for which one?

A.

Identification information for each stakeholder

B.

Assessment information of the stakeholders' major requirements, expectations, and potential influence

C.

Stakeholder classification of their role in the project

D.

Stakeholder management strategy

Full Access
Question # 11

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

A.

TCP port 80

B.

TCP port 25

C.

UDP port 161

D.

TCP port 110

Full Access
Question # 12

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

A.

SLA

B.

NDA

C.

Non-price competition

D.

CNC

Full Access
Question # 13

Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open issues in the project and how the resolution of the issues may lead to additional project changes. On what document are Tomas and the stakeholders working in this scenario?

A.

Communications management plan

B.

Change management plan

C.

Issue log

D.

Risk management plan

Full Access
Question # 14

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

A.

Preserve the email server including all logs.

B.

Seize the employee's PC.

C.

Make copies of that employee's email.

D.

Place spyware on the employee's PC to confirm these activities.

Full Access
Question # 15

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

A.

Disaster Recovery Plan

B.

Contingency Plan

C.

Continuity Of Operations Plan

D.

Business Continuity Plan

Full Access
Question # 16

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

A.

It performs vulnerability/threat analysis assessment.

B.

It identifies and generates IA requirements.

C.

It provides data needed to accurately assess IA readiness.

D.

It provides for entry and storage of individual system data.

Full Access
Question # 17

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.

Network security policy

B.

Backup policy

C.

Privacy policy

D.

User password policy

Full Access
Question # 18

Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication. Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.

A.

Internet telephony

B.

Instant messaging

C.

Electronic mail

D.

Post-it note

E.

Blogs

F.

Internet teleconferencing

Full Access
Question # 19

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

A.

Evidence access policy

B.

Incident responsepolicy

C.

Chain of custody

D.

Chain of evidence

Full Access
Question # 20

Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

A.

Risk register

B.

Risk management plan

C.

Quality management plan

D.

Project charter

Full Access
Question # 21

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

A.

Businesscontinuity plan

B.

Crisis communication plan

C.

Contingency plan

D.

Disaster recovery plan

Full Access
Question # 22

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

A.

Cost plus incentive fee

B.

Fixed fee

C.

Cost plus percentage of costs

D.

Time and materials

Full Access
Question # 23

Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

A.

Cost Plus Fixed Fee

B.

Cost Plus Percentage of Cost

C.

Cost Plus Incentive Fee

D.

Cost Plus Award Fee

Full Access
Question # 24

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

A.

Configuration management

B.

Risk management

C.

Procurement management

D.

Change management

Full Access
Question # 25

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart?

A.

Quantitative analysis

B.

Contingency reserve

C.

Risk response

D.

Risk response plan

Full Access
Question # 26

You have created a team of HR Managers and Project Managers for Blue Well Inc. The team will concentrate on hiring some new employees for the company and improving the organization's overall security by turning employees among numerous job positions. Which of the following steps will you perform to accomplish the task?

A.

Job rotation

B.

Job responsibility

C.

Screening candidates

D.

Separation of duties

Full Access
Question # 27

Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?

A.

Thermal alarm systems

B.

Closed circuit cameras

C.

Encryption

D.

Security Guards

Full Access
Question # 28

Which of the following are the responsibilities of the owner with regard to data in an information classification program? Each correct answer represents a complete solution. Choose three.

A.

Determining what level of classification the information requires.

B.

Delegating the responsibility of the data protection duties to a custodian.

C.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

D.

Running regular backups and routinely testing the validity of the backup data.

Full Access
Question # 29

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

A.

Device Seizure

B.

Ontrack

C.

DriveSpy

D.

Forensic Sorter

Full Access
Question # 30

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1.To account for all IT assets 2.To provide precise information support to other ITIL disciplines 3.To provide a solid base only for Incident and Problem Management 4.To verify configuration records and correct any exceptions

A.

1, 3, and 4 only

B.

2 and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Full Access
Question # 31

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

A.

Outsource

B.

Proposal

C.

Contract

D.

Service level agreement

Full Access
Question # 32

Mark is the project manager of the NHQ project in Spartech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

A.

$92,600

B.

$67,250

C.

$68,250

D.

$72,650

Full Access