ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

Become a Premium Member for full access
  Unlock Premium Member

Question 92

Report Export Collapse

Which of the following needs to be documented to preserve evidences for presentation in court?

Become a Premium Member for full access
  Unlock Premium Member

Question 93

Report Export Collapse

Which of the following statements best explains how encryption works on the Internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 94

Report Export Collapse

Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

Become a Premium Member for full access
  Unlock Premium Member

Question 95

Report Export Collapse

Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.

Become a Premium Member for full access
  Unlock Premium Member

Question 96

Report Export Collapse

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

Become a Premium Member for full access
  Unlock Premium Member

Question 97

Report Export Collapse

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Become a Premium Member for full access
  Unlock Premium Member

Question 98

Report Export Collapse

Which of the following security models focuses on data confidentiality and controlled access to classified information?

Become a Premium Member for full access
  Unlock Premium Member

Question 99

Report Export Collapse

SIMULATION

Fill in the blank with the appropriate phrase. ____________ is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.

Become a Premium Member for full access
  Unlock Premium Member

Question 100

Report Export Collapse

SIMULATION

Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct

Become a Premium Member for full access
  Unlock Premium Member
Total 218 questions
Go to page: of 22
Search

Related questions