Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ISC CISSP-ISSMP ISSMP®: Information Systems Security Management Professional Exam Practice Test

Demo: 32 questions
Total 218 questions

ISSMP®: Information Systems Security Management Professional Questions and Answers

Question 1

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

Options:

A.

SSAA

B.

FITSAF

C.

FIPS

D.

TCSEC

Question 2

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It determines actions and behaviors of a single individual within a system.

B.

It ensures reliable and timely access to resources.

C.

It ensures that unauthorized modifications are not made to data byauthorized personnel or processes.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Question 3

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

Options:

A.

OPSEC assessment

Question 4

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?

Options:

A.

Earned value management

B.

Risk audit

C.

Technical performance measurement

D.

Correctiveaction

Question 5

Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security awareness training

B.

Security policy

C.

Data Backup

D.

Auditing

Question 6

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Utility model

B.

Cookie

C.

Copyright

D.

Trade secret

Question 7

What is a stakeholder analysis chart?

Options:

A.

It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.

B.

It is a matrix that identifies all of the stakeholders and to whom they must report to.

C.

It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place..

D.

It is a matrix that identifies who must communicate with whom.

Question 8

Which of the following rate systems of the Orange book has no security controls?

Options:

A.

D-rated

B.

C-rated

C.

E-rated

D.

A-rated

Question 9

The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next time. What are the typical areas for improvement? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Information dissemination policy

B.

Electronic monitoring statement

C.

Additional personnel security controls

D.

Incident response plan

Question 10

What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.

Options:

A.

Troubleshooting

B.

Investigation

C.

Upgradation

D.

Backup

Question 11

Which of the following SDLC phases consists of the given security controls. Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation

Options:

A.

Design

B.

Maintenance

C.

Deployment

D.

Requirements Gathering

Question 12

Which of the following issues are addressed by the change control phase in the maintenance phase of the life cycle models? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Performing quality control

B.

Recreating and analyzing the problem

C.

Developing the changes and corresponding tests

D.

Establishing the priorities of requests

Question 13

Rachael is the project manager for a large project in her organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they've already completed the project work they were contracted to do. What can Rachael do in this instance?

Options:

A.

Threaten to sue the vendor if they don't complete the work.

B.

Fire the vendor for failing to complete the contractual obligation.

C.

Withhold the vendor's payments for the work they've completed.

D.

Refer to the contract agreement for direction.

Question 14

Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It can be achieved by installing service packs and security updates on a regular basis.

B.

It is used for securing the computer hardware.

C.

It can be achieved by locking the computer room.

D.

It is used for securing an operating system.

Question 15

Which of the following relies on a physical characteristic of the user to verify his identity?

Options:

A.

Social Engineering

B.

Kerberos v5

C.

Biometrics

D.

CHAP

Question 16

Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

Options:

A.

Cost Plus Fixed Fee

B.

Cost Plus Percentage of Cost

C.

Cost Plus Incentive Fee

D.

Cost Plus Award Fee

Question 17

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

Options:

A.

Risk management plan

B.

Lessons learned documentation

C.

Risk register

D.

Stakeholder management strategy

Question 18

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

Options:

A.

Outsource

B.

Proposal

C.

Contract

D.

Service level agreement

Question 19

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Options:

A.

Device Seizure

B.

Ontrack

C.

DriveSpy

D.

Forensic Sorter

Question 20

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

Options:

A.

IP spoofing

B.

Broadcast storm

C.

Password sniffing

D.

DoS attack

Question 21

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Wiretap Act

C.

Computer Fraud and Abuse Act

D.

Economic Espionage Act of 1996

Question 22

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.

PAP

B.

EAP

C.

MS-CHAP v2

D.

CHAP

Question 23

Which of the following statements best explains how encryption works on the Internet?

Options:

A.

Encryption encodes information using specific algorithms with a string of numbers known as a key.

B.

Encryption validates a username and passwordbefore sending information to the Web server.

C.

Encryption allows authorized users to access Web sites that offer online shopping.

D.

Encryption helps in transaction processing by e-commerce servers on the Internet.

Question 24

You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your company. You have completed the risk analysis processes for the risk events. You and the project team have created risk responses for most of the identified project risks. Which of the following risk response planning techniques will you use to shift the impact of a threat to a third party, together with the responses?

Options:

A.

Risk mitigation

B.

Risk acceptance

C.

Risk avoidance

D.

Risk transference

Question 25

Which of the following statements about Due Care policy is true?

Options:

A.

It is a method used to authenticate users on a network.

B.

It is a method for securing database servers.

C.

It identifies the level of confidentiality of information.

D.

It provides information about new viruses.

Question 26

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Secret

B.

Sensitive

C.

Unclassified

D.

Private

E.

Confidential

F.

Public

Question 27

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

Options:

A.

NSA-IAM

B.

DITSCAP

C.

ASSET

D.

NIACAP

Question 28

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

Options:

A.

Preserve the email server including all logs.

B.

Seize the employee's PC.

C.

Make copies of that employee's email.

D.

Place spyware on the employee's PC to confirm these activities.

Question 29

Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct

Options:

A.

Patch management

Question 30

Which of the following is a variant with regard to Configuration Management?

Options:

A.

A CI thathas the same name as another CI but shares no relationship.

B.

A CI that particularly refers to a hardware specification.

C.

A CI that has the same essential functionality as another CI but a bit different in some small manner.

D.

A CI that particularly refers to a software version.

Question 31

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintain and Monitor

B.

Organization Vulnerability

C.

Define Policy

D.

Baseline the Environment

Question 32

Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Administrative

B.

Automatic

C.

Physical

D.

Technical

Demo: 32 questions
Total 218 questions