Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

ISSMP Information Systems Security Management Professional Questions and Answers

Questions 4

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

Options:

A.

The Configuration Manager

B.

The Supplier Manager

C.

The Service Catalogue Manager

D.

The IT Service Continuity Manager

Buy Now
Questions 5

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

Options:

A.

Clark-Biba model

B.

Clark-Wilson model

C.

Bell-LaPadula model

D.

Biba model

Buy Now
Questions 6

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Options:

A.

Business continuity plan development

B.

Business impact assessment

C.

Scope and plan initiation

D.

Plan approval and implementation

Buy Now
Questions 7

Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Provide diligent and competent service to principals.

B.

Protect society, the commonwealth, and the infrastructure.

C.

Give guidance for resolving good versus good and bad versus bad dilemmas.

D.

Act honorably, honestly, justly, responsibly, and legally.

Buy Now
Questions 8

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Options:

A.

Businesscontinuity plan

B.

Crisis communication plan

C.

Contingency plan

D.

Disaster recovery plan

Buy Now
Questions 9

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Options:

A.

Availability

B.

Non-repudiation

C.

Integrity

D.

Confidentiality

Buy Now
Questions 10

NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information on security policies. Which of the following are some of its critical steps? Each correct answer represents a complete solution. Choose two.

Options:

A.

Awareness and Training Material Effectiveness

B.

Awareness and Training Material Development

C.

Awareness and Training Material Implementation

D.

Awareness and Training Program Design

Buy Now
Questions 11

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Separation of duties

B.

Account lockout policy

C.

Incident response policy

D.

Chain of custody

Buy Now
Questions 12

Mark works as a security manager for SoftTech Inc. He is performing a security awareness program. To be successful in performing the awareness program, he should take into account the needs and current levels of training and understanding of the employees and audience. There are five key ways, which Mark should keep in mind while performing this activity. Current level of computer usage What the audience really wants to learn How receptive the audience is to the security program How to gain acceptance Who might be a possible ally Which of the following activities is performed in this security awareness process?

Options:

A.

Separation of duties

B.

Stunned owl syndrome

C.

Audience participation

D.

Audience segmentation

Buy Now
Questions 13

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Copyright law

B.

Trademark law

C.

Privacy law

D.

Security law

Buy Now
Questions 14

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

Options:

A.

Risk management plan

B.

Lessons learned documentation

C.

Risk register

D.

Stakeholder management strategy

Buy Now
Questions 15

Which of the following is the best method to stop vulnerability attacks on a Web server?

Options:

A.

Using strong passwords

B.

Configuring a firewall

C.

Implementing the latest virus scanner

D.

Installing service packs and updates

Buy Now
Questions 16

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

C-rated

C.

D-rated

D.

A-rated

Buy Now
Questions 17

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Fixed fee

C.

Cost plus percentage of costs

D.

Time and materials

Buy Now
Questions 18

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Options:

A.

Monitor and Control Risks

B.

Identify Risks

C.

Perform Qualitative Risk Analysis

D.

Perform Quantitative Risk Analysis

Buy Now
Questions 19

What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?

Options:

A.

ZOPA

B.

PON

C.

Bias

D.

BATNA

Buy Now
Questions 20

Which of the following statements is related with the second law of OPSEC?

Options:

A.

If you are not protecting it (the critical and sensitive information), the adversary wins!

B.

If you don't know what to protect, how do you know you are protecting it?

C.

If you don't know about your security resources you could not protect your network.

D.

If you don't know the threat, how do you know what to protect?

Buy Now
Questions 21

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Secret

B.

Sensitive

C.

Unclassified

D.

Private

E.

Confidential

F.

Public

Buy Now
Questions 22

Which of the following are known as the three laws of OPSEC? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Ifyou don't know the threat, how do you know what to protect?

B.

If you don't know what to protect, how do you know you are protecting it?

C.

If you are not protecting it (the critical and sensitive information), the adversary wins!

D.

If you don't knowabout your security resources you cannot protect your network.

Buy Now
Questions 23

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Names of the victims

B.

Location of each incident

C.

Nature of harassment

D.

Date and time of incident

Buy Now
Questions 24

Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due?

Options:

A.

Expected breach

B.

Actual breach

C.

Anticipatory breach

D.

Nonperforming breach

Buy Now
Questions 25

Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct

Options:

A.

Patch management

Buy Now
Questions 26

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

FTP

B.

IPX/SPX

C.

IPSec

D.

EAP

Buy Now
Questions 27

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

Options:

A.

SLA

B.

NDA

C.

Non-price competition

D.

CNC

Buy Now
Questions 28

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It determines actions and behaviors of a single individual within a system.

B.

It ensures reliable and timely access to resources.

C.

It ensures that unauthorized modifications are not made to data byauthorized personnel or processes.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Buy Now
Questions 29

Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.

Options:

A.

Assessing the impact of potential threats

B.

Identifying the accused

C.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

D.

Identifying the risk

Buy Now
Questions 30

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Recover to an alternate site for critical functions

B.

Restore full system at an alternate operating site

C.

Restore full system after a catastrophic loss

D.

Recover at the primary operating site

Buy Now
Questions 31

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

Options:

A.

Malicious Communications Act (1998)

B.

Anti-Cyber-Stalking law (1999)

C.

Stalking Amendment Act(1999)

D.

Stalking by Electronic Communications Act (2001)

Buy Now
Questions 32

Which of the following sections come under the ISO/IEC 27002 standard?

Options:

A.

Financial assessment

B.

Asset management

C.

Security policy

D.

Risk assessment

Buy Now
Exam Code: ISSMP
Exam Name: Information Systems Security Management Professional
Last Update: Nov 21, 2024
Questions: 0

PDF + Testing Engine

$850

Testing Engine

$95

PDF (Q&A)

$80