ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

A.
Risk register
A.
Risk register
Answers
B.
Risk management plan
B.
Risk management plan
Answers
C.
Quality management plan
C.
Quality management plan
Answers
D.
Project charter
D.
Project charter
Answers
Suggested answer: A

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

A.
PAP
A.
PAP
Answers
B.
EAP
B.
EAP
Answers
C.
MS-CHAP v2
C.
MS-CHAP v2
Answers
D.
CHAP
D.
CHAP
Answers
Suggested answer: B

Which of the following test methods has the objective to test the IT system from the viewpoint of a threat-source and to identify potential failures in the IT system protection schemes?

A.
Penetration testing
A.
Penetration testing
Answers
B.
On-site interviews
B.
On-site interviews
Answers
C.
Security Test and Evaluation (ST&E)
C.
Security Test and Evaluation (ST&E)
Answers
D.
Automated vulnerability scanning tool
D.
Automated vulnerability scanning tool
Answers
Suggested answer: A

Which of the following statements reflect the 'Code of Ethics Preamble' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution.

Choose all that apply.

A.
Strict adherence to this Code is a condition of certification.
A.
Strict adherence to this Code is a condition of certification.
Answers
B.
Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
B.
Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
Answers
C.
Advance and protect the profession.
C.
Advance and protect the profession.
Answers
D.
Provide diligent and competent service to principals.
D.
Provide diligent and competent service to principals.
Answers
Suggested answer: A, B

Which of the following options is an approach to restricting system access to authorized users?

A.
DAC
A.
DAC
Answers
B.
MIC
B.
MIC
Answers
C.
RBAC
C.
RBAC
Answers
D.
MAC
D.
MAC
Answers
Suggested answer: C

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

A.
Conflict of interest
A.
Conflict of interest
Answers
B.
Bribery
B.
Bribery
Answers
C.
Illegal practice
C.
Illegal practice
Answers
D.
Irresponsible practice
D.
Irresponsible practice
Answers
Suggested answer: A

What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?

A.
ZOPA
A.
ZOPA
Answers
B.
PON
B.
PON
Answers
C.
Bias
C.
Bias
Answers
D.
BATNA
D.
BATNA
Answers
Suggested answer: D

Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due?

A.
Expected breach
A.
Expected breach
Answers
B.
Actual breach
B.
Actual breach
Answers
C.
Anticipatory breach
C.
Anticipatory breach
Answers
D.
Nonperforming breach
D.
Nonperforming breach
Answers
Suggested answer: C

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.
Phishing
A.
Phishing
Answers
B.
Wiretapping
B.
Wiretapping
Answers
C.
SMB signing
C.
SMB signing
Answers
D.
Spoofing
D.
Spoofing
Answers
Suggested answer: B

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

A.
Evidence access policy
A.
Evidence access policy
Answers
B.
Incident response policy
B.
Incident response policy
Answers
C.
Chain of custody
C.
Chain of custody
Answers
D.
Chain of evidence
D.
Chain of evidence
Answers
Suggested answer: C
Total 218 questions
Go to page: of 22