Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CISSP-ISSMP Sample Questions Answers

Questions 4

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

Options:

A.

TLS

B.

PGP

C.

S/MIME

D.

IPSec

Buy Now
Questions 5

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk mitigation

B.

Risk transfer

C.

Risk acceptance

D.

Risk avoidance

Buy Now
Questions 6

Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due?

Options:

A.

Expected breach

B.

Actual breach

C.

Anticipatory breach

D.

Nonperforming breach

Buy Now
Questions 7

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

Options:

A.

IFB

B.

RFQ

C.

RFP

D.

RFI

Buy Now
Questions 8

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Fixed fee

C.

Cost plus percentage of costs

D.

Time and materials

Buy Now
Questions 9

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintain and Monitor

B.

Organization Vulnerability

C.

Define Policy

D.

Baseline the Environment

Buy Now
Questions 10

Which of the following options is an approach to restricting system access to authorized users?

Options:

A.

DAC

B.

MIC

C.

RBAC

D.

MAC

Buy Now
Questions 11

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

Options:

A.

Copyright law

B.

Trademark law

C.

Privacy law

D.

Security law

Buy Now
Questions 12

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Options:

A.

Collusion

B.

Eavesdropping

C.

Buffer overflow

D.

Phishing

Buy Now
Questions 13

Which of the following SDLC phases consists of the given security controls. Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation

Options:

A.

Design

B.

Maintenance

C.

Deployment

D.

Requirements Gathering

Buy Now
Questions 14

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Secret

B.

Sensitive

C.

Unclassified

D.

Private

E.

Confidential

F.

Public

Buy Now
Questions 15

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

Options:

A.

Quantitative risk analysis

B.

Qualitative risk analysis

C.

Requested changes

D.

Risk audits

Buy Now
Questions 16

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

Options:

A.

Emergency-management team

B.

Damage-assessment team

C.

Off-site storage team

D.

Emergency action team

Buy Now
Questions 17

Which of the following statements is related with the first law of OPSEC?

Options:

A.

If you are not protecting it (the critical and sensitive information), the adversary wins!

B.

If you don't know what to protect, how do you know you are protecting it?

C.

If you don't know about your security resources you could not protect your network.

D.

If you don't know the threat, how do you know what toprotect?

Buy Now
Questions 18

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Options:

A.

Shielding

B.

Spoofing

C.

Eavesdropping

D.

Packaging

Buy Now
Questions 19

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?

Options:

A.

Containment

B.

Eradication

C.

Preparation

D.

Identification

Buy Now
Questions 20

Which of the following statements is true about auditing?

Options:

A.

It is used to protect the network against virus attacks.

B.

It is used to track user accounts for file and object access, logon attempts, etc.

C.

It is used to secure the network or the computers on the network.

D.

It is used to prevent unauthorized access to network resources.

Buy Now
Questions 21

Which of the following security models dictates that subjects can only access objects through applications?

Options:

A.

Biba-Clark model

B.

Bell-LaPadula

C.

Clark-Wilson

D.

Biba model

Buy Now
Questions 22

Which of the following statements is related with the second law of OPSEC?

Options:

A.

If you are not protecting it (the critical and sensitive information), the adversary wins!

B.

If you don't know what to protect, how do you know you are protecting it?

C.

If you don't know about your security resources you could not protect your network.

D.

If you don't know the threat, how do you know what to protect?

Buy Now
Questions 23

Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Provide diligent and competent service to principals.

B.

Protect society, the commonwealth, and the infrastructure.

C.

Give guidance for resolving good versus good and bad versus bad dilemmas.

D.

Act honorably, honestly, justly, responsibly, and legally.

Buy Now
Questions 24

Mark is the project manager of the NHQ project in Spartech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$92,600

B.

$67,250

C.

$68,250

D.

$72,650

Buy Now
Questions 25

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

Options:

A.

Initiation Phase

B.

Development/Acquisition Phase

C.

Implementation Phase

D.

Operation/Maintenance Phase

Buy Now
Questions 26

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Non-repudiation

B.

Confidentiality

C.

Authentication

D.

Integrity

Buy Now
Questions 27

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. Which of the following ideas will you consider the best when conducting a security awareness campaign?

Options:

A.

Target system administrators and the help desk.

B.

Provide technical details on exploits.

C.

Provide customizedmessages for different groups.

D.

Target senior managers and business process owners.

Buy Now
Questions 28

You have created a team of HR Managers and Project Managers for Blue Well Inc. The team will concentrate on hiring some new employees for the company and improving the organization's overall security by turning employees among numerous job positions. Which of the following steps will you perform to accomplish the task?

Options:

A.

Job rotation

B.

Job responsibility

C.

Screening candidates

D.

Separation of duties

Buy Now
Questions 29

Which of the following are the process steps of OPSEC? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Analysis of Vulnerabilities

B.

Display of associated vulnerability components

C.

Assessment of Risk

D.

Identification of Critical Information

Buy Now
Questions 30

Which of the following are the responsibilities of the owner with regard to data in an information classification program? Each correct answer represents a complete solution. Choose three.

Options:

A.

Determining what level of classification the information requires.

B.

Delegating the responsibility of the data protection duties to a custodian.

C.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

D.

Running regular backups and routinely testing the validity of the backup data.

Buy Now
Questions 31

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart?

Options:

A.

Quantitative analysis

B.

Contingency reserve

C.

Risk response

D.

Risk response plan

Buy Now
Questions 32

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

Options:

A.

Mitigation

B.

Sharing

C.

Acceptance

D.

Transference

Buy Now
Status:
Expired
Exam Code: CISSP-ISSMP
Exam Name: ISSMP®: Information Systems Security Management Professional
Last Update: Apr 21, 2023
Questions: 218
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CISSP-ISSMP