ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

A.
Configuration management
A.
Configuration management
Answers
B.
Risk management
B.
Risk management
Answers
C.
Procurement management
C.
Procurement management
Answers
D.
Change management
D.
Change management
Answers
Suggested answer: A

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

A.
TLS
A.
TLS
Answers
B.
PGP
B.
PGP
Answers
C.
S/MIME
C.
S/MIME
Answers
D.
IPSec
D.
IPSec
Answers
Suggested answer: B, C

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?

A.
Containment
A.
Containment
Answers
B.
Eradication
B.
Eradication
Answers
C.
Preparation
C.
Preparation
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: D

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

A.
Cold sites arrangement
A.
Cold sites arrangement
Answers
B.
Business impact analysis
B.
Business impact analysis
Answers
C.
Duplicate processing facilities
C.
Duplicate processing facilities
Answers
D.
Reciprocal agreements
D.
Reciprocal agreements
Answers
Suggested answer: D

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

A.
Data diddling
A.
Data diddling
Answers
B.
Wiretapping
B.
Wiretapping
Answers
C.
Eavesdropping
C.
Eavesdropping
Answers
D.
Spoofing
D.
Spoofing
Answers
Suggested answer: A

Which of the following penetration testing phases involves reconnaissance or data gathering?

A.
Attack phase
A.
Attack phase
Answers
B.
Pre-attack phase
B.
Pre-attack phase
Answers
C.
Post-attack phase
C.
Post-attack phase
Answers
D.
Out-attack phase
D.
Out-attack phase
Answers
Suggested answer: B

Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational. Which of the following are the objectives related to the above phase in which

Mark is involved? Each correct answer represents a part of the solution. Choose three.

A.
Resource requirements identification
A.
Resource requirements identification
Answers
B.
Criticality prioritization
B.
Criticality prioritization
Answers
C.
Down-time estimation
C.
Down-time estimation
Answers
D.
Performing vulnerability assessment
D.
Performing vulnerability assessment
Answers
Suggested answer: A, B, C

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A.
Business continuity plan
A.
Business continuity plan
Answers
B.
Disaster recovery plan
B.
Disaster recovery plan
Answers
C.
Continuity of Operations Plan
C.
Continuity of Operations Plan
Answers
D.
Contingency plan
D.
Contingency plan
Answers
Suggested answer: D

Which of the following protocols is used with a tunneling protocol to provide security?

A.
FTP
A.
FTP
Answers
B.
IPX/SPX
B.
IPX/SPX
Answers
C.
IPSec
C.
IPSec
Answers
D.
EAP
D.
EAP
Answers
Suggested answer: C

Which of the following subphases are defined in the maintenance phase of the life cycle models?

A.
Change control
A.
Change control
Answers
B.
Configuration control
B.
Configuration control
Answers
C.
Request control
C.
Request control
Answers
D.
Release control
D.
Release control
Answers
Suggested answer: A, C, D
Total 218 questions
Go to page: of 22