ISC CISSP-ISSMP Practice Test - Questions Answers, Page 10
List of questions
Related questions
Question 91
Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?
Question 92
Which of the following needs to be documented to preserve evidences for presentation in court?
Question 93
Which of the following statements best explains how encryption works on the Internet?
Question 94
Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?
Question 95
Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.
Question 96
Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?
Question 97
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
Question 98
Which of the following security models focuses on data confidentiality and controlled access to classified information?
Question 99
SIMULATION
Fill in the blank with the appropriate phrase. ____________ is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.
Question 100
SIMULATION
Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct
Question