ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?

A.
Gramm-Leach-Bliley Act
A.
Gramm-Leach-Bliley Act
Answers
B.
Computer Fraud and Abuse Act
B.
Computer Fraud and Abuse Act
Answers
C.
Computer Security Act
C.
Computer Security Act
Answers
D.
Digital Millennium Copyright Act
D.
Digital Millennium Copyright Act
Answers
Suggested answer: B

SIMULATION Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.

A.
Life cycle
A.
Life cycle
Answers
Suggested answer: A

You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:

How much capital should the project set aside for the risk contingency reserve?

A.
$142,000
A.
$142,000
Answers
B.
$232,000
B.
$232,000
Answers
C.
$41,750
C.
$41,750
Answers
D.
$23,750
D.
$23,750
Answers
Suggested answer: D

Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.

A.
It can be achieved by installing service packs and security updates on a regular basis.
A.
It can be achieved by installing service packs and security updates on a regular basis.
Answers
B.
It is used for securing the computer hardware.
B.
It is used for securing the computer hardware.
Answers
C.
It can be achieved by locking the computer room.
C.
It can be achieved by locking the computer room.
Answers
D.
It is used for securing an operating system.
D.
It is used for securing an operating system.
Answers
Suggested answer: A, D

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution.

Choose all that apply.

A.
Editor
A.
Editor
Answers
B.
Custodian
B.
Custodian
Answers
C.
Owner
C.
Owner
Answers
D.
Security auditor
D.
Security auditor
Answers
E.
User
E.
User
Answers
Suggested answer: B, C, D, E

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

A.
Monitor and Control Risks
A.
Monitor and Control Risks
Answers
B.
Identify Risks
B.
Identify Risks
Answers
C.
Perform Qualitative Risk Analysis
C.
Perform Qualitative Risk Analysis
Answers
D.
Perform Quantitative Risk Analysis
D.
Perform Quantitative Risk Analysis
Answers
Suggested answer: A

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.
Project contractual relationship with the vendor
A.
Project contractual relationship with the vendor
Answers
B.
Project management plan
B.
Project management plan
Answers
C.
Project communications plan
C.
Project communications plan
Answers
D.
Project scope statement
D.
Project scope statement
Answers
Suggested answer: B

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

A.
Risk management plan
A.
Risk management plan
Answers
B.
Lessons learned documentation
B.
Lessons learned documentation
Answers
C.
Risk register
C.
Risk register
Answers
D.
Stakeholder management strategy
D.
Stakeholder management strategy
Answers
Suggested answer: C

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

A.
Vulnerability Assessment and Penetration Testing
A.
Vulnerability Assessment and Penetration Testing
Answers
B.
Security Certification and Accreditation (C&A)
B.
Security Certification and Accreditation (C&A)
Answers
C.
Change and Configuration Control
C.
Change and Configuration Control
Answers
D.
Risk Adjustments
D.
Risk Adjustments
Answers
Suggested answer: A, B, D

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

A.
Collusion
A.
Collusion
Answers
B.
Eavesdropping
B.
Eavesdropping
Answers
C.
Buffer overflow
C.
Buffer overflow
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: A
Total 218 questions
Go to page: of 22