ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

Which of the following statements is related with the second law of OPSEC?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

SIMULATION

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

Which of the following backup sites takes the longest recovery time?

Become a Premium Member for full access
  Unlock Premium Member
Total 218 questions
Go to page: of 22
Search

Related questions