ISC CISSP-ISSMP Practice Test - Questions Answers, Page 22
List of questions
Question 211

Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?
Question 212

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?
Question 213

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
Question 214

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.
Question 215

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
Question 216

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70%of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?
Question 217

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?
Question 218

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.
Question