Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

ISSMP Sample Questions Answers

Questions 4

Which of the following subphases are defined in the maintenance phase of the life cycle models?

Options:

A.

Change control

B.

Configuration control

C.

Request control

D.

Release control

Buy Now
Questions 5

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

Options:

A.

Configuration identification

B.

Physical configuration audit

C.

Configuration control

D.

Functional configuration audit

Buy Now
Questions 6

Which of the following are the responsibilities of the owner with regard to data in an information classification program? Each correct answer represents a complete solution. Choose three.

Options:

A.

Determining what level of classification the information requires.

B.

Delegating the responsibility of the data protection duties to a custodian.

C.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

D.

Running regular backups and routinely testing the validity of the backup data.

Buy Now
Questions 7

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

Options:

A.

Risk management plan

B.

Lessons learned documentation

C.

Risk register

D.

Stakeholder management strategy

Buy Now
Questions 8

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

Options:

A.

IFB

B.

RFQ

C.

RFP

D.

RFI

Buy Now
Questions 9

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

Options:

A.

Malicious Communications Act (1998)

B.

Anti-Cyber-Stalking law (1999)

C.

Stalking Amendment Act(1999)

D.

Stalking by Electronic Communications Act (2001)

Buy Now
Questions 10

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Mobile Site

B.

Cold Site

C.

Warm Site

D.

Hot Site

Buy Now
Questions 11

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Disaster recovery plan

B.

Contingency plan

C.

Continuity of Operations Plan

D.

Business continuity plan

Buy Now
Questions 12

Which of the following statements best describes the consequences of the disaster recovery plan test?

Options:

A.

If no deficiencies were found during the test, then the test was probably flawed.

B.

The plan should not be changed no matter what the results of the test would be.

C.

The results of the test should be kept secret.

D.

If no deficiencies were found during the test, then the plan is probably perfect.

Buy Now
Questions 13

Which of the following signatures watches for the connection attempts to well-known, frequently attacked ports?

Options:

A.

Port signatures

B.

Digital signatures

C.

Header condition signatures

D.

String signatures

Buy Now
Questions 14

Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources and information? Each correct answer represents a complete solution. Choose three.

Options:

A.

Employee registration and accounting

B.

Disaster preparedness and recovery plans

C.

Network authentication

D.

Training and awareness

E.

Encryption

Buy Now
Questions 15

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Fixed fee

C.

Cost plus percentage of costs

D.

Time and materials

Buy Now
Questions 16

Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

Options:

A.

Risk register

B.

Risk management plan

C.

Quality management plan

D.

Project charter

Buy Now
Questions 17

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

Options:

A.

The Service Level Manager

B.

The Configuration Manager

C.

The IT Security Manager

D.

The Change Manager

Buy Now
Questions 18

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

Options:

A.

Role-Based Access Control

B.

Discretionary Access Control

C.

Task-based Access Control

D.

Mandatory Access Control

Buy Now
Questions 19

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Options:

A.

Electronic Communications Privacy Act of 1986

B.

Wiretap Act

C.

Computer Fraud and Abuse Act

D.

Economic Espionage Act of 1996

Buy Now
Questions 20

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

Options:

A.

Initiation Phase

B.

Development/Acquisition Phase

C.

Implementation Phase

D.

Operation/Maintenance Phase

Buy Now
Questions 21

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Maintain and Monitor

B.

Organization Vulnerability

C.

Define Policy

D.

Baseline the Environment

Buy Now
Questions 22

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Recover to an alternate site for critical functions

B.

Restore full system at an alternate operating site

C.

Restore full system after a catastrophic loss

D.

Recover at the primary operating site

Buy Now
Questions 23

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Editor

B.

Custodian

C.

Owner

D.

Security auditor

E.

User

Buy Now
Questions 24

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:

A.

Safeguard

B.

Single Loss Expectancy (SLE)

C.

Exposure Factor (EF)

D.

Annualized Rate of Occurrence (ARO)

Buy Now
Questions 25

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Organizational chart reviews

B.

Executive management interviews

C.

Overlaying system technology

D.

Organizational process models

Buy Now
Questions 26

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

Options:

A.

The Configuration Manager

B.

The Supplier Manager

C.

The Service Catalogue Manager

D.

The IT Service Continuity Manager

Buy Now
Questions 27

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Direct

B.

Circumstantial

C.

Incontrovertible

D.

Corroborating

Buy Now
Questions 28

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

Options:

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Authenticity

Buy Now
Questions 29

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Non-repudiation

B.

Confidentiality

C.

Authentication

D.

Integrity

Buy Now
Questions 30

Which of the following needs to be documented to preserve evidences for presentation in court?

Options:

A.

Separation of duties

B.

Account lockout policy

C.

Incident response policy

D.

Chain of custody

Buy Now
Questions 31

Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational. Which of the following are the objectives related to the above phase in which Mark is involved? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Resource requirements identification

B.

Criticality prioritization

C.

Down-time estimation

D.

Performing vulnerability assessment

Buy Now
Questions 32

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

Options:

A.

IP spoofing

B.

Broadcast storm

C.

Password sniffing

D.

DoS attack

Buy Now