ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Which of the following laws is defined as the Law of Nations or the legal norms that has developed through the customary exchanges between states over time, whether based on diplomacy or aggression?

A.
Customary
A.
Customary
Answers
B.
Tort
B.
Tort
Answers
C.
Criminal
C.
Criminal
Answers
D.
Administrative
D.
Administrative
Answers
Suggested answer: A

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

A.
Availability
A.
Availability
Answers
B.
Non-repudiation
B.
Non-repudiation
Answers
C.
Integrity
C.
Integrity
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: C

Which of the following anti-child pornography organizations helps local communities to create programs and develop strategies to investigate child exploitation?

A.
Internet Crimes Against Children (ICAC)
A.
Internet Crimes Against Children (ICAC)
Answers
B.
Project Safe Childhood (PSC)
B.
Project Safe Childhood (PSC)
Answers
C.
Anti-Child Porn.org
C.
Anti-Child Porn.org
Answers
D.
Innocent Images National Imitative (IINI)
D.
Innocent Images National Imitative (IINI)
Answers
Suggested answer: B

You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your company. You have completed the risk analysis processes for the risk events. You and the project team have created risk responses for most of the identified project risks. Which of the following risk response planning techniques will you use to shift the impact of a threat to a third party, together with the responses?

A.
Risk mitigation
A.
Risk mitigation
Answers
B.
Risk acceptance
B.
Risk acceptance
Answers
C.
Risk avoidance
C.
Risk avoidance
Answers
D.
Risk transference
D.
Risk transference
Answers
Suggested answer: D

SIMULATION

Fill in the blank with an appropriate word. _________ are used in information security to formalize security policies.

A.
Models
A.
Models
Answers
Suggested answer: A

Which of the following are known as the three laws of OPSEC? Each correct answer represents a part of the solution. Choose three.

A.
If you don't know the threat, how do you know what to protect?
A.
If you don't know the threat, how do you know what to protect?
Answers
B.
If you don't know what to protect, how do you know you are protecting it?
B.
If you don't know what to protect, how do you know you are protecting it?
Answers
C.
If you are not protecting it (the critical and sensitive information), the adversary wins!
C.
If you are not protecting it (the critical and sensitive information), the adversary wins!
Answers
D.
If you don't know about your security resources you cannot protect your network.
D.
If you don't know about your security resources you cannot protect your network.
Answers
Suggested answer: A, B, C

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

A.
Mobile Site
A.
Mobile Site
Answers
B.
Cold Site
B.
Cold Site
Answers
C.
Warm Site
C.
Warm Site
Answers
D.
Hot Site
D.
Hot Site
Answers
Suggested answer: D

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.
Packet filtering
A.
Packet filtering
Answers
B.
Tunneling
B.
Tunneling
Answers
C.
Packet sniffing
C.
Packet sniffing
Answers
D.
Spoofing
D.
Spoofing
Answers
Suggested answer: B

Which of the following is a name, symbol, or slogan with which a product is identified?

A.
Copyright
A.
Copyright
Answers
B.
Trademark
B.
Trademark
Answers
C.
Trade secret
C.
Trade secret
Answers
D.
Patent
D.
Patent
Answers
Suggested answer: B

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.
Network security policy
A.
Network security policy
Answers
B.
Backup policy
B.
Backup policy
Answers
C.
Privacy policy
C.
Privacy policy
Answers
D.
User password policy
D.
User password policy
Answers
Suggested answer: C
Total 218 questions
Go to page: of 22