ExamGecko
Home Home / ISC / CISSP-ISSMP
Ask QuestionAsk Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Question 11

Report
Export
Collapse

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.
Non-repudiation
A.
Non-repudiation
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Authentication
C.
Authentication
Answers
D.
Integrity
D.
Integrity
Answers
Suggested answer: A
asked 18/09/2024
Kaddy Kabuya
47 questions

Question 12

Report
Export
Collapse

Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

A.
It performs vulnerability/threat analysis assessment.
A.
It performs vulnerability/threat analysis assessment.
Answers
B.
It identifies and generates IA requirements.
B.
It identifies and generates IA requirements.
Answers
C.
It provides data needed to accurately assess IA readiness.
C.
It provides data needed to accurately assess IA readiness.
Answers
D.
It provides for entry and storage of individual system data.
D.
It provides for entry and storage of individual system data.
Answers
Suggested answer: A, B, C
asked 18/09/2024
Owais Mansoor
40 questions

Question 13

Report
Export
Collapse

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A.
Code Security law
A.
Code Security law
Answers
B.
Trademark laws
B.
Trademark laws
Answers
C.
Copyright laws
C.
Copyright laws
Answers
D.
Patent laws
D.
Patent laws
Answers
Suggested answer: D
asked 18/09/2024
ftere yagoglu
43 questions

Question 14

Report
Export
Collapse

Which of the following is the best method to stop vulnerability attacks on a Web server?

A.
Using strong passwords
A.
Using strong passwords
Answers
B.
Configuring a firewall
B.
Configuring a firewall
Answers
C.
Implementing the latest virus scanner
C.
Implementing the latest virus scanner
Answers
D.
Installing service packs and updates
D.
Installing service packs and updates
Answers
Suggested answer: D
asked 18/09/2024
ce temp2
42 questions

Question 15

Report
Export
Collapse

Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?

A.
Managed level
A.
Managed level
Answers
B.
Defined level
B.
Defined level
Answers
C.
Fundamental level
C.
Fundamental level
Answers
D.
Repeatable level
D.
Repeatable level
Answers
Suggested answer: C
asked 18/09/2024
Tammy Tran
30 questions

Question 16

Report
Export
Collapse

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

A.
Emergency-management team
A.
Emergency-management team
Answers
B.
Damage-assessment team
B.
Damage-assessment team
Answers
C.
Off-site storage team
C.
Off-site storage team
Answers
D.
Emergency action team
D.
Emergency action team
Answers
Suggested answer: D
asked 18/09/2024
Vitalii Lutsenko
33 questions

Question 17

Report
Export
Collapse

Which of the following security models dictates that subjects can only access objects through applications?

A.
Biba-Clark model
A.
Biba-Clark model
Answers
B.
Bell-LaPadula
B.
Bell-LaPadula
Answers
C.
Clark-Wilson
C.
Clark-Wilson
Answers
D.
Biba model
D.
Biba model
Answers
Suggested answer: C
asked 18/09/2024
Garvey Butler
44 questions

Question 18

Report
Export
Collapse

Which of the following relies on a physical characteristic of the user to verify his identity?

A.
Social Engineering
A.
Social Engineering
Answers
B.
Kerberos v5
B.
Kerberos v5
Answers
C.
Biometrics
C.
Biometrics
Answers
D.
CHAP
D.
CHAP
Answers
Suggested answer: C
asked 18/09/2024
Marcos Losa Torviso
53 questions

Question 19

Report
Export
Collapse

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.

A.
Data downloading from the Internet
A.
Data downloading from the Internet
Answers
B.
File and object access
B.
File and object access
Answers
C.
Network logons and logoffs
C.
Network logons and logoffs
Answers
D.
Printer access
D.
Printer access
Answers
Suggested answer: B, C, D
asked 18/09/2024
Daniel Adebayo
43 questions

Question 20

Report
Export
Collapse

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A.
Operational audit
A.
Operational audit
Answers
B.
Dependent audit
B.
Dependent audit
Answers
C.
Non-operational audit
C.
Non-operational audit
Answers
D.
Independent audit
D.
Independent audit
Answers
Suggested answer: D
asked 18/09/2024
Kishen Morar
45 questions
Total 218 questions
Go to page: of 22