ExamGecko
Home Home / ISC / CISSP-ISSMP
Ask QuestionAsk Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Question 31

Report
Export
Collapse

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

A.
Names of the victims
A.
Names of the victims
Answers
B.
Location of each incident
B.
Location of each incident
Answers
C.
Nature of harassment
C.
Nature of harassment
Answers
D.
Date and time of incident
D.
Date and time of incident
Answers
Suggested answer: A, B, D
asked 18/09/2024
Tamas Szekely
36 questions

Question 32

Report
Export
Collapse

Which of the following types of evidence is considered as the best evidence?

A.
A copy of the original document
A.
A copy of the original document
Answers
B.
Information gathered through the witness's senses
B.
Information gathered through the witness's senses
Answers
C.
The original document
C.
The original document
Answers
D.
A computer-generated record
D.
A computer-generated record
Answers
Suggested answer: C
asked 18/09/2024
Pawel Szalek
36 questions

Question 33

Report
Export
Collapse

What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.

A.
Troubleshooting
A.
Troubleshooting
Answers
B.
Investigation
B.
Investigation
Answers
C.
Upgradation
C.
Upgradation
Answers
D.
Backup
D.
Backup
Answers
Suggested answer: A, B
asked 18/09/2024
Unai M
39 questions

Question 34

Report
Export
Collapse

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

A.
SSAA
A.
SSAA
Answers
B.
FITSAF
B.
FITSAF
Answers
C.
FIPS
C.
FIPS
Answers
D.
TCSEC
D.
TCSEC
Answers
Suggested answer: A
asked 18/09/2024
shafinaaz hossenny
37 questions

Question 35

Report
Export
Collapse

Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?

A.
Vulnerability analysis
A.
Vulnerability analysis
Answers
B.
Cost-benefit analysis
B.
Cost-benefit analysis
Answers
C.
Gap analysis
C.
Gap analysis
Answers
D.
Requirement analysis
D.
Requirement analysis
Answers
Suggested answer: C
asked 18/09/2024
m laven
30 questions

Question 36

Report
Export
Collapse

A contract cannot have provisions for which one of the following?

A.
Subcontracting the work
A.
Subcontracting the work
Answers
B.
Penalties and fines for disclosure of intellectual rights
B.
Penalties and fines for disclosure of intellectual rights
Answers
C.
A deadline for the completion of the work
C.
A deadline for the completion of the work
Answers
D.
Illegal activities
D.
Illegal activities
Answers
Suggested answer: D
asked 18/09/2024
Alexis Chacon
31 questions

Question 37

Report
Export
Collapse

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

A.
Risk mitigation
A.
Risk mitigation
Answers
B.
Risk transfer
B.
Risk transfer
Answers
C.
Risk acceptance
C.
Risk acceptance
Answers
D.
Risk avoidance
D.
Risk avoidance
Answers
Suggested answer: B
asked 18/09/2024
BERNDT HAMBOECK
26 questions

Question 38

Report
Export
Collapse

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

A.
It improves the possibility for career advancement of the IT staff.
A.
It improves the possibility for career advancement of the IT staff.
Answers
B.
It improves the security of vendor relations.
B.
It improves the security of vendor relations.
Answers
C.
It improves the performance of a company's intranet.
C.
It improves the performance of a company's intranet.
Answers
D.
It improves awareness of the need to protect system resources.
D.
It improves awareness of the need to protect system resources.
Answers
Suggested answer: D
asked 18/09/2024
Lawrence Bargers
32 questions

Question 39

Report
Export
Collapse

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?

A.
Availability
A.
Availability
Answers
B.
Encryption
B.
Encryption
Answers
C.
Integrity
C.
Integrity
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: D
asked 18/09/2024
Luis Maciel
42 questions

Question 40

Report
Export
Collapse

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

A.
Scope Verification
A.
Scope Verification
Answers
B.
Project Management Information System
B.
Project Management Information System
Answers
C.
Integrated Change Control
C.
Integrated Change Control
Answers
D.
Configuration Management System
D.
Configuration Management System
Answers
Suggested answer: D
asked 18/09/2024
Domenico D'Angelo
40 questions
Total 218 questions
Go to page: of 22