ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?

A.
WinHex
A.
WinHex
Answers
B.
Vedit
B.
Vedit
Answers
C.
Device Seizure
C.
Device Seizure
Answers
D.
FAR system
D.
FAR system
Answers
Suggested answer: D

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability? Each correct answer represents a part of the solution. Choose three.

A.
Recover to an alternate site for critical functions
A.
Recover to an alternate site for critical functions
Answers
B.
Restore full system at an alternate operating site
B.
Restore full system at an alternate operating site
Answers
C.
Restore full system after a catastrophic loss
C.
Restore full system after a catastrophic loss
Answers
D.
Recover at the primary operating site
D.
Recover at the primary operating site
Answers
Suggested answer: A, C, D

DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.

A.
System Definition
A.
System Definition
Answers
B.
Accreditation
B.
Accreditation
Answers
C.
Verification
C.
Verification
Answers
D.
Re-Accreditation
D.
Re-Accreditation
Answers
E.
Validation
E.
Validation
Answers
F.
Identification
F.
Identification
Answers
Suggested answer: A, C, D, E

Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell

Bonny?

A.
A risk audit is a review of all the risks that have yet to occur and what their probability of happening are.
A.
A risk audit is a review of all the risks that have yet to occur and what their probability of happening are.
Answers
B.
A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.
B.
A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.
Answers
C.
A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.
C.
A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.
Answers
D.
A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.
D.
A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.
Answers
Suggested answer: B

Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.

A.
Acquire
A.
Acquire
Answers
B.
Analyze
B.
Analyze
Answers
C.
Authenticate
C.
Authenticate
Answers
D.
Encrypt
D.
Encrypt
Answers
Suggested answer: A, B, C

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

A.
Password policies
A.
Password policies
Answers
B.
Vulnerability assessments
B.
Vulnerability assessments
Answers
C.
Data encryption
C.
Data encryption
Answers
D.
Data classification
D.
Data classification
Answers
Suggested answer: A, B, D

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. Which of the following ideas will you consider the best when conducting a security awareness campaign?

A.
Target system administrators and the help desk.
A.
Target system administrators and the help desk.
Answers
B.
Provide technical details on exploits.
B.
Provide technical details on exploits.
Answers
C.
Provide customized messages for different groups.
C.
Provide customized messages for different groups.
Answers
D.
Target senior managers and business process owners.
D.
Target senior managers and business process owners.
Answers
Suggested answer: C

Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?

A.
Second Code of Ethics Canons
A.
Second Code of Ethics Canons
Answers
B.
Fourth Code of Ethics Canons
B.
Fourth Code of Ethics Canons
Answers
C.
First Code of Ethics Canons
C.
First Code of Ethics Canons
Answers
D.
Third Code of Ethics Canons
D.
Third Code of Ethics Canons
Answers
Suggested answer: A

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

A.
B-rated
A.
B-rated
Answers
B.
C-rated
B.
C-rated
Answers
C.
D-rated
C.
D-rated
Answers
D.
A-rated
D.
A-rated
Answers
Suggested answer: A

Which of the following SDLC phases consists of the given security controls. Misuse Case Modeling Security Design and Architecture Review Threat and Risk

Modeling Security Requirements and Test Cases Generation

A.
Design
A.
Design
Answers
B.
Maintenance
B.
Maintenance
Answers
C.
Deployment
C.
Deployment
Answers
D.
Requirements Gathering
D.
Requirements Gathering
Answers
Suggested answer: A
Total 218 questions
Go to page: of 22