ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.
Safeguard
A.
Safeguard
Answers
B.
Single Loss Expectancy (SLE)
B.
Single Loss Expectancy (SLE)
Answers
C.
Exposure Factor (EF)
C.
Exposure Factor (EF)
Answers
D.
Annualized Rate of Occurrence (ARO)
D.
Annualized Rate of Occurrence (ARO)
Answers
Suggested answer: D

Which of the following statements is related with the second law of OPSEC?

A.
If you are not protecting it (the critical and sensitive information), the adversary wins!
A.
If you are not protecting it (the critical and sensitive information), the adversary wins!
Answers
B.
If you don't know what to protect, how do you know you are protecting it?
B.
If you don't know what to protect, how do you know you are protecting it?
Answers
C.
If you don't know about your security resources you could not protect your network.
C.
If you don't know about your security resources you could not protect your network.
Answers
D.
If you don't know the threat, how do you know what to protect?
D.
If you don't know the threat, how do you know what to protect?
Answers
Suggested answer: B

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

A.
Business continuity plan development
A.
Business continuity plan development
Answers
B.
Business impact assessment
B.
Business impact assessment
Answers
C.
Scope and plan initiation
C.
Scope and plan initiation
Answers
D.
Plan approval and implementation
D.
Plan approval and implementation
Answers
Suggested answer: A

SIMULATION

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

A.
OPSEC assessment
A.
OPSEC assessment
Answers
Suggested answer: A

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

A.
Electronic Communications Privacy Act of 1986
A.
Electronic Communications Privacy Act of 1986
Answers
B.
Wiretap Act
B.
Wiretap Act
Answers
C.
Computer Fraud and Abuse Act
C.
Computer Fraud and Abuse Act
Answers
D.
Economic Espionage Act of 1996
D.
Economic Espionage Act of 1996
Answers
Suggested answer: A

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

A.
It provides object, orient, decide and act strategy.
A.
It provides object, orient, decide and act strategy.
Answers
B.
It provides a live documentation of the project.
B.
It provides a live documentation of the project.
Answers
C.
It provides the risk analysis of project configurations.
C.
It provides the risk analysis of project configurations.
Answers
D.
It provides the versions for network devices.
D.
It provides the versions for network devices.
Answers
Suggested answer: B, D

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

A.
Preserve the email server including all logs.
A.
Preserve the email server including all logs.
Answers
B.
Seize the employee's PC.
B.
Seize the employee's PC.
Answers
C.
Make copies of that employee's email.
C.
Make copies of that employee's email.
Answers
D.
Place spyware on the employee's PC to confirm these activities.
D.
Place spyware on the employee's PC to confirm these activities.
Answers
Suggested answer: A

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

A.
Secret
A.
Secret
Answers
B.
Sensitive
B.
Sensitive
Answers
C.
Unclassified
C.
Unclassified
Answers
D.
Private
D.
Private
Answers
E.
Confidential
E.
Confidential
Answers
F.
Public
F.
Public
Answers
Suggested answer: B, D, E, F

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

A.
Utility model
A.
Utility model
Answers
B.
Cookie
B.
Cookie
Answers
C.
Copyright
C.
Copyright
Answers
D.
Trade secret
D.
Trade secret
Answers
Suggested answer: D

Which of the following backup sites takes the longest recovery time?

A.
Cold site
A.
Cold site
Answers
B.
Hot site
B.
Hot site
Answers
C.
Warm site
C.
Warm site
Answers
D.
Mobile backup site
D.
Mobile backup site
Answers
Suggested answer: A
Total 218 questions
Go to page: of 22