Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium ISC ISSMP Dumps Questions Answers

Page: 1 / 8
Total 218 questions

ISSMP®: Information Systems Security Management Professional Questions and Answers

Question 1

Which of the following issues are addressed by the change control phase in the maintenance phase of the life cycle models? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Performing quality control

B.

Recreating and analyzing the problem

C.

Developing the changes and corresponding tests

D.

Establishing the priorities of requests

Buy Now
Question 2

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Options:

A.

Utility model

B.

Cookie

C.

Copyright

D.

Trade secret

Question 3

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Qualitative risk analysis

C.

Requested changes

D.

Risk audits

Question 4

What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.

Options:

A.

Troubleshooting

B.

Investigation

C.

Upgradation

D.

Backup

Question 5

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses TCP port 80 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It uses TCP port 443 as the default port.

D.

It is a protocol used to provide security for a database server in an internal network.

Question 6

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

Options:

A.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)

B.

Asset Value X Exposure Factor (EF)

C.

Exposure Factor (EF)/Single Loss Expectancy (SLE)

D.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

Question 7

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

Options:

A.

Preserve the email server including all logs.

B.

Seize the employee's PC.

C.

Make copies of that employee's email.

D.

Place spyware on the employee's PC to confirm these activities.

Question 8

You work as a Web Administrator for Perfect World Inc. The company is planning to host an E-commerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use encrypted authentication.

B.

Use the SSL protocol.

C.

Use the EAP protocol.

D.

Use Basic authentication.

Question 9

Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?

Options:

A.

Division A

B.

Division D

C.

Division B

D.

Division C

Question 10

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Privacy

Question 11

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1.To account for all IT assets 2.To provide precise information support to other ITIL disciplines 3.To provide a solid base only for Incident and Problem Management 4.To verify configuration records and correct any exceptions

Options:

A.

1, 3, and 4 only

B.

2 and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Question 12

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

Options:

A.

Project contractual relationship with the vendor

B.

Project management plan

C.

Project communications plan

D.

Project scope statement

Question 13

Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.

Options:

A.

Assessing the impact of potential threats

B.

Identifying the accused

C.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

D.

Identifying the risk

Question 14

Which of the following plans provides procedures for recovering business operations immediately following a disaster?

Options:

A.

Disaster recovery plan

B.

Business continuity plan

C.

Continuity of operation plan

D.

Business recovery plan

Question 15

Which of the following is the best method to stop vulnerability attacks on a Web server?

Options:

A.

Using strong passwords

B.

Configuring a firewall

C.

Implementing the latest virus scanner

D.

Installing service packs and updates

Question 16

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Options:

A.

Network security policy

B.

Backup policy

C.

Privacy policy

D.

User password policy

Question 17

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

Options:

A.

Data downloading from the Internet

B.

File and object access

C.

Network logons and logoffs

D.

Printer access

Question 18

Which of the following security issues does the Bell-La Padula model focus on?

Options:

A.

Authentication

B.

Confidentiality

C.

Integrity

D.

Authorization

Question 19

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Mobile Site

B.

Cold Site

C.

Warm Site

D.

Hot Site

Question 20

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

Options:

A.

PAP

B.

EAP

C.

MS-CHAP v2

D.

CHAP

Question 21

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Options:

A.

Shielding

B.

Spoofing

C.

Eavesdropping

D.

Packaging

Question 22

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

Options:

A.

Disaster Recovery Plan

B.

Contingency Plan

C.

Continuity Of Operations Plan

D.

Business Continuity Plan

Question 23

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

Options:

A.

Take-Grant Protection Model

B.

Bell-LaPadula Model

C.

Biba Integrity Model

D.

Access Matrix

Question 24

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

Options:

A.

Programming andtraining

B.

Evaluation and acceptance

C.

Initiation

D.

Design

Question 25

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

Options:

A.

Scope Verification

B.

Project Management Information System

C.

Integrated Change Control

D.

Configuration Management System

Question 26

How many change control systems are there in project management?

Options:

A.

3

B.

4

C.

2

D.

1

Question 27

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

PROTECT Act

B.

Sexual Predators Act

C.

Civil Rights Act of 1991

D.

The USA Patriot Act of 2001

Question 28

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

Options:

A.

SLA

B.

NDA

C.

Non-price competition

D.

CNC

Question 29

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

Options:

A.

Risk management plan

B.

Lessons learned documentation

C.

Risk register

D.

Stakeholder management strategy

Question 30

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Business continuity plan

B.

Disaster recovery plan

C.

Continuity of Operations Plan

D.

Contingency plan

Question 31

John works as a security manager for Soft Tech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

Options:

A.

Full-scale exercise

B.

Walk-through drill

C.

Evacuation drill

D.

Structured walk-through test

Question 32

Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.

Options:

A.

They can be analyzed and measured by the risk analysis process.

B.

They can be removed completely by taking proper actions.

C.

They can be mitigated by reviewing and taking responsible actions based on possible risks.

D.

They are considered an indicator of threats coupled with vulnerability.

Page: 1 / 8
Total 218 questions