ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?

Gramm-Leach-Bliley Act
Gramm-Leach-Bliley Act
Computer Fraud and Abuse Act
Computer Fraud and Abuse Act
Computer Security Act
Computer Security Act
Digital Millennium Copyright Act
Digital Millennium Copyright Act
Suggested answer: B
asked 18/09/2024
Allen Yang
38 questions

Question 22

Report Export Collapse

SIMULATION Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.

Life cycle
Life cycle
Suggested answer: A
asked 18/09/2024
John Murphy
35 questions

Question 23

Report Export Collapse

You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:

ISC CISSP-ISSMP image Question 23 47821 09182024210553000000

How much capital should the project set aside for the risk contingency reserve?

$142,000
$142,000
$232,000
$232,000
$41,750
$41,750
$23,750
$23,750
Suggested answer: D
asked 18/09/2024
martin lopez
29 questions

Question 24

Report Export Collapse

Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.

It can be achieved by installing service packs and security updates on a regular basis.
It can be achieved by installing service packs and security updates on a regular basis.
It is used for securing the computer hardware.
It is used for securing the computer hardware.
It can be achieved by locking the computer room.
It can be achieved by locking the computer room.
It is used for securing an operating system.
It is used for securing an operating system.
Suggested answer: A, D
asked 18/09/2024
Jimmie Campbell
39 questions

Question 25

Report Export Collapse

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution.

Choose all that apply.

Editor
Editor
Custodian
Custodian
Owner
Owner
Security auditor
Security auditor
User
User
Suggested answer: B, C, D, E
asked 18/09/2024
Nogueira Elder
41 questions

Question 26

Report Export Collapse

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Monitor and Control Risks
Monitor and Control Risks
Identify Risks
Identify Risks
Perform Qualitative Risk Analysis
Perform Qualitative Risk Analysis
Perform Quantitative Risk Analysis
Perform Quantitative Risk Analysis
Suggested answer: A
asked 18/09/2024
Francisco Jesús Cano Hinarejos
59 questions

Question 27

Report Export Collapse

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

Project contractual relationship with the vendor
Project contractual relationship with the vendor
Project management plan
Project management plan
Project communications plan
Project communications plan
Project scope statement
Project scope statement
Suggested answer: B
asked 18/09/2024
Rashid Hashim
47 questions

Question 28

Report Export Collapse

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

Risk management plan
Risk management plan
Lessons learned documentation
Lessons learned documentation
Risk register
Risk register
Stakeholder management strategy
Stakeholder management strategy
Suggested answer: C
asked 18/09/2024
kevin klyn
42 questions

Question 29

Report Export Collapse

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing
Security Certification and Accreditation (C&A)
Security Certification and Accreditation (C&A)
Change and Configuration Control
Change and Configuration Control
Risk Adjustments
Risk Adjustments
Suggested answer: A, B, D
asked 18/09/2024
Mary Cris Barreda
35 questions

Question 30

Report Export Collapse

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

Collusion
Collusion
Eavesdropping
Eavesdropping
Buffer overflow
Buffer overflow
Phishing
Phishing
Suggested answer: A
asked 18/09/2024
Angelo Gulisano
41 questions
Total 218 questions
Go to page: of 22
Search

Related questions