ExamGecko
Home Home / ISC / CISSP-ISSMP
Ask QuestionAsk Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











Question 141

Report
Export
Collapse

Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

A.
Risk register
A.
Risk register
Answers
B.
Risk management plan
B.
Risk management plan
Answers
C.
Quality management plan
C.
Quality management plan
Answers
D.
Project charter
D.
Project charter
Answers
Suggested answer: A
asked 18/09/2024
Ricardo de Sá Carvalho
38 questions

Question 142

Report
Export
Collapse

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

A.
PAP
A.
PAP
Answers
B.
EAP
B.
EAP
Answers
C.
MS-CHAP v2
C.
MS-CHAP v2
Answers
D.
CHAP
D.
CHAP
Answers
Suggested answer: B
asked 18/09/2024
Elliott Fields
34 questions

Question 143

Report
Export
Collapse

Which of the following test methods has the objective to test the IT system from the viewpoint of a threat-source and to identify potential failures in the IT system protection schemes?

A.
Penetration testing
A.
Penetration testing
Answers
B.
On-site interviews
B.
On-site interviews
Answers
C.
Security Test and Evaluation (ST&E)
C.
Security Test and Evaluation (ST&E)
Answers
D.
Automated vulnerability scanning tool
D.
Automated vulnerability scanning tool
Answers
Suggested answer: A
asked 18/09/2024
Hairul Isman Abdul Gaffar
38 questions

Question 144

Report
Export
Collapse

Which of the following statements reflect the 'Code of Ethics Preamble' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution.

Choose all that apply.

A.
Strict adherence to this Code is a condition of certification.
A.
Strict adherence to this Code is a condition of certification.
Answers
B.
Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
B.
Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
Answers
C.
Advance and protect the profession.
C.
Advance and protect the profession.
Answers
D.
Provide diligent and competent service to principals.
D.
Provide diligent and competent service to principals.
Answers
Suggested answer: A, B
asked 18/09/2024
Débora Gomes Almeida
45 questions

Question 145

Report
Export
Collapse

Which of the following options is an approach to restricting system access to authorized users?

A.
DAC
A.
DAC
Answers
B.
MIC
B.
MIC
Answers
C.
RBAC
C.
RBAC
Answers
D.
MAC
D.
MAC
Answers
Suggested answer: C
asked 18/09/2024
Tiago Silva
39 questions

Question 146

Report
Export
Collapse

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

A.
Conflict of interest
A.
Conflict of interest
Answers
B.
Bribery
B.
Bribery
Answers
C.
Illegal practice
C.
Illegal practice
Answers
D.
Irresponsible practice
D.
Irresponsible practice
Answers
Suggested answer: A
asked 18/09/2024
DIGIX srl
32 questions

Question 147

Report
Export
Collapse

What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?

A.
ZOPA
A.
ZOPA
Answers
B.
PON
B.
PON
Answers
C.
Bias
C.
Bias
Answers
D.
BATNA
D.
BATNA
Answers
Suggested answer: D
asked 18/09/2024
Marcelo Rubio Caiado
44 questions

Question 148

Report
Export
Collapse

Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due?

A.
Expected breach
A.
Expected breach
Answers
B.
Actual breach
B.
Actual breach
Answers
C.
Anticipatory breach
C.
Anticipatory breach
Answers
D.
Nonperforming breach
D.
Nonperforming breach
Answers
Suggested answer: C
asked 18/09/2024
Vishal Vitthal Pawar
41 questions

Question 149

Report
Export
Collapse

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.
Phishing
A.
Phishing
Answers
B.
Wiretapping
B.
Wiretapping
Answers
C.
SMB signing
C.
SMB signing
Answers
D.
Spoofing
D.
Spoofing
Answers
Suggested answer: B
asked 18/09/2024
Roger Perez Espitia
38 questions

Question 150

Report
Export
Collapse

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

A.
Evidence access policy
A.
Evidence access policy
Answers
B.
Incident response policy
B.
Incident response policy
Answers
C.
Chain of custody
C.
Chain of custody
Answers
D.
Chain of evidence
D.
Chain of evidence
Answers
Suggested answer: C
asked 18/09/2024
Marco Romani
37 questions
Total 218 questions
Go to page: of 22