ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 22

Question list
Search
Search

Related questions











Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?

A.
No
A.
No
Answers
B.
Yes
B.
Yes
Answers
Suggested answer: B

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

A.
Take-Grant Protection Model
A.
Take-Grant Protection Model
Answers
B.
Bell-LaPadula Model
B.
Bell-LaPadula Model
Answers
C.
Biba Integrity Model
C.
Biba Integrity Model
Answers
D.
Access Matrix
D.
Access Matrix
Answers
Suggested answer: A

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

A.
Business continuity plan
A.
Business continuity plan
Answers
B.
Crisis communication plan
B.
Crisis communication plan
Answers
C.
Contingency plan
C.
Contingency plan
Answers
D.
Disaster recovery plan
D.
Disaster recovery plan
Answers
Suggested answer: A

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.

A.
Confidentiality
A.
Confidentiality
Answers
B.
Integrity
B.
Integrity
Answers
C.
Availability
C.
Availability
Answers
D.
Privacy
D.
Privacy
Answers
Suggested answer: A, B, C

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

A.
Shielding
A.
Shielding
Answers
B.
Spoofing
B.
Spoofing
Answers
C.
Eavesdropping
C.
Eavesdropping
Answers
D.
Packaging
D.
Packaging
Answers
Suggested answer: C

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70%of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

A.
Configuration identification
A.
Configuration identification
Answers
B.
Physical configuration audit
B.
Physical configuration audit
Answers
C.
Configuration control
C.
Configuration control
Answers
D.
Functional configuration audit
D.
Functional configuration audit
Answers
Suggested answer: B

In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?

A.
Role-Based Access Control
A.
Role-Based Access Control
Answers
B.
Discretionary Access Control
B.
Discretionary Access Control
Answers
C.
Task-based Access Control
C.
Task-based Access Control
Answers
D.
Mandatory Access Control
D.
Mandatory Access Control
Answers
Suggested answer: B

Which of the following access control models are used in the commercial sector? Each correct answer represents a complete solution. Choose two.

A.
Clark-Biba model
A.
Clark-Biba model
Answers
B.
Clark-Wilson model
B.
Clark-Wilson model
Answers
C.
Bell-LaPadula model
C.
Bell-LaPadula model
Answers
D.
Biba model
D.
Biba model
Answers
Suggested answer: B, D

Explanation:


Total 218 questions
Go to page: of 22