Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ISC ISSMP ISSMP®: Information Systems Security Management Professional Exam Practice Test

Demo: 32 questions
Total 218 questions

ISSMP®: Information Systems Security Management Professional Questions and Answers

Question 1

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

Options:

A.

Preserve the email server including all logs.

B.

Seize the employee's PC.

C.

Make copies of that employee's email.

D.

Place spyware on the employee's PC to confirm these activities.

Question 2

Which of the following security models dictates that subjects can only access objects through applications?

Options:

A.

Biba-Clark model

B.

Bell-LaPadula

C.

Clark-Wilson

D.

Biba model

Question 3

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Organizational chart reviews

B.

Executive management interviews

C.

Overlaying system technology

D.

Organizational process models

Question 4

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk mitigation

B.

Risk transfer

C.

Risk acceptance

D.

Risk avoidance

Question 5

Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?

Options:

A.

Division A

B.

Division D

C.

Division B

D.

Division C

Question 6

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Business continuity plan

B.

Disaster recovery plan

C.

Continuity of Operations Plan

D.

Contingency plan

Question 7

Which of the following measurements of an enterprise's security state is the process whereby an organization establishes the parameters within which programs, investments, and acquisitions reach the desired results?

Options:

A.

Information sharing

B.

Ethics

C.

Performance measurement

D.

Risk management

Question 8

You work as a Web Administrator for Perfect World Inc. The company is planning to host an E-commerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use encrypted authentication.

B.

Use the SSL protocol.

C.

Use the EAP protocol.

D.

Use Basic authentication.

Question 9

Which of the following is a variant with regard to Configuration Management?

Options:

A.

A CI thathas the same name as another CI but shares no relationship.

B.

A CI that particularly refers to a hardware specification.

C.

A CI that has the same essential functionality as another CI but a bit different in some small manner.

D.

A CI that particularly refers to a software version.

Question 10

How many change control systems are there in project management?

Options:

A.

3

B.

4

C.

2

D.

1

Question 11

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

Options:

A.

Mitigation

B.

Sharing

C.

Acceptance

D.

Transference

Question 12

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Mobile Site

B.

Cold Site

C.

Warm Site

D.

Hot Site

Question 13

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

Options:

A.

The Service Level Manager

B.

The Configuration Manager

C.

The IT Security Manager

D.

The Change Manager

Question 14

Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?

Options:

A.

Encouraging others to harass the victim

B.

False accusations

C.

Attempts to gather information about the victim

D.

False victimization

Question 15

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

PROTECT Act

B.

Sexual Predators Act

C.

Civil Rights Act of 1991

D.

The USA Patriot Act of 2001

Question 16

Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?

Options:

A.

WinHex

B.

Vedit

C.

Device Seizure

D.

FAR system

Question 17

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Options:

A.

18 U.S.C. 1362

B.

18 U.S.C. 1030

C.

18 U.S.C. 1029

D.

18 U.S.C. 2701

E.

18 U.S.C. 2510

Question 18

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Options:

A.

Patent

B.

Utility model

C.

Snooping

D.

Copyright

Question 19

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Safeguard

B.

Single Loss Expectancy (SLE)

C.

Exposure Factor (EF)

D.

Annualized Rate of Occurrence (ARO)

Question 20

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Direct

B.

Circumstantial

C.

Incontrovertible

D.

Corroborating

Question 21

Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.

Options:

A.

They can be analyzed and measured by the risk analysis process.

B.

They can be removed completely by taking proper actions.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They are considered an indicator of threats coupled with vulnerability.

Question 22

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

Options:

A.

Spam

B.

Patent

C.

Artistic license

D.

Phishing

Question 23

Rachael is the project manager for a large project in her organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they've already completed the project work they were contracted to do. What can Rachael do in this instance?

Options:

A.

Threaten to sue the vendor if they don't complete the work.

B.

Fire the vendor for failing to complete the contractual obligation.

C.

Withhold the vendor's payments for the work they've completed.

D.

Refer to the contract agreement for direction.

Question 24

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Secret

B.

Sensitive

C.

Unclassified

D.

Private

E.

Confidential

F.

Public

Question 25

Which of the following laws enacted in United States makes it illegal for an Internet Service Provider (ISP) to allow child pornography to exist on Web sites?

Options:

A.

Child Pornography Prevention Act (CPPA)

B.

USA PATRIOT Act

C.

Prosecutorial Remedies and Tools Against the Exploitation of Children Today Act (PROTECT Act)

D.

Sexual Predators Act

Question 26

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Contingency plan

C.

Continuity of Operations Plan

D.

Business continuity plan

Question 27

Which of the following is the best method to stop vulnerability attacks on a Web server?

Options:

A.

Using strong passwords

B.

Configuring a firewall

C.

Implementing the latest virus scanner

D.

Installing service packs and updates

Question 28

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Copyright law

B.

Trademark law

C.

Privacy law

D.

Security law

Question 29

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

Options:

A.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)

B.

Asset Value X Exposure Factor (EF)

C.

Exposure Factor (EF)/Single Loss Expectancy (SLE)

D.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

Question 30

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Buffer overflow

D.

Phishing

Question 31

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

Options:

A.

Cost

B.

Resources

C.

Contract

D.

Schedule

Question 32

Which of the following anti-child pornography organizations helps local communities to create programs and develop strategies to investigate child exploitation?

Options:

A.

Internet Crimes Against Children (ICAC)

B.

Project Safe Childhood (PSC)

C.

Anti-Child Porn.org

D.

Innocent Images National Imitative (IINI)

Demo: 32 questions
Total 218 questions