ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 16

Question list
Search

List of questions

Search

Related questions











Question 151

Report
Export
Collapse

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Safeguard
Safeguard
Single Loss Expectancy (SLE)
Single Loss Expectancy (SLE)
Exposure Factor (EF)
Exposure Factor (EF)
Annualized Rate of Occurrence (ARO)
Annualized Rate of Occurrence (ARO)
Suggested answer: D
asked 18/09/2024
Luis Campoy
41 questions

Question 152

Report
Export
Collapse

Which of the following statements is related with the second law of OPSEC?

If you are not protecting it (the critical and sensitive information), the adversary wins!
If you are not protecting it (the critical and sensitive information), the adversary wins!
If you don't know what to protect, how do you know you are protecting it?
If you don't know what to protect, how do you know you are protecting it?
If you don't know about your security resources you could not protect your network.
If you don't know about your security resources you could not protect your network.
If you don't know the threat, how do you know what to protect?
If you don't know the threat, how do you know what to protect?
Suggested answer: B
asked 18/09/2024
Michał Wojciechowski
30 questions

Question 153

Report
Export
Collapse

Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?

Business continuity plan development
Business continuity plan development
Business impact assessment
Business impact assessment
Scope and plan initiation
Scope and plan initiation
Plan approval and implementation
Plan approval and implementation
Suggested answer: A
asked 18/09/2024
jose fajardo
34 questions

Question 154

Report
Export
Collapse

SIMULATION

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

OPSEC assessment
OPSEC assessment
Suggested answer: A
asked 18/09/2024
RODRIGO BALISTA
40 questions

Question 155

Report
Export
Collapse

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?

Electronic Communications Privacy Act of 1986
Electronic Communications Privacy Act of 1986
Wiretap Act
Wiretap Act
Computer Fraud and Abuse Act
Computer Fraud and Abuse Act
Economic Espionage Act of 1996
Economic Espionage Act of 1996
Suggested answer: A
asked 18/09/2024
Dan Yann
47 questions

Question 156

Report
Export
Collapse

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

It provides object, orient, decide and act strategy.
It provides object, orient, decide and act strategy.
It provides a live documentation of the project.
It provides a live documentation of the project.
It provides the risk analysis of project configurations.
It provides the risk analysis of project configurations.
It provides the versions for network devices.
It provides the versions for network devices.
Suggested answer: B, D
asked 18/09/2024
Enrique Jose Lopez Bolivar
43 questions

Question 157

Report
Export
Collapse

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

Preserve the email server including all logs.
Preserve the email server including all logs.
Seize the employee's PC.
Seize the employee's PC.
Make copies of that employee's email.
Make copies of that employee's email.
Place spyware on the employee's PC to confirm these activities.
Place spyware on the employee's PC to confirm these activities.
Suggested answer: A
asked 18/09/2024
AARON MCCOMBS
46 questions

Question 158

Report
Export
Collapse

Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.

Secret
Secret
Sensitive
Sensitive
Unclassified
Unclassified
Private
Private
Confidential
Confidential
Public
Public
Suggested answer: B, D, E, F
asked 18/09/2024
Joseph Lewis
44 questions

Question 159

Report
Export
Collapse

Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?

Utility model
Utility model
Cookie
Cookie
Copyright
Copyright
Trade secret
Trade secret
Suggested answer: D
asked 18/09/2024
Benito Gonzalez
36 questions

Question 160

Report
Export
Collapse

Which of the following backup sites takes the longest recovery time?

Cold site
Cold site
Hot site
Hot site
Warm site
Warm site
Mobile backup site
Mobile backup site
Suggested answer: A
asked 18/09/2024
Kurt Woodfin
43 questions
Total 218 questions
Go to page: of 22