ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Question 41

Report
Export
Collapse

Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication. Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.

A.
Internet telephony
A.
Internet telephony
Answers
B.
Instant messaging
B.
Instant messaging
Answers
C.
Electronic mail
C.
Electronic mail
Answers
D.
Post-it note
D.
Post-it note
Answers
E.
Blogs
E.
Blogs
Answers
F.
Internet teleconferencing
F.
Internet teleconferencing
Answers
Suggested answer: A, B, C, E, F
asked 18/09/2024
Ridwan Sulaiman
35 questions

Question 42

Report
Export
Collapse

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

A.
Mitigation
A.
Mitigation
Answers
B.
Sharing
B.
Sharing
Answers
C.
Acceptance
C.
Acceptance
Answers
D.
Transference
D.
Transference
Answers
Suggested answer: B
asked 18/09/2024
Lee, Eduardo
48 questions

Question 43

Report
Export
Collapse

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

A.
HIPAA
A.
HIPAA
Answers
B.
COPPA
B.
COPPA
Answers
C.
FERPA
C.
FERPA
Answers
D.
GLBA
D.
GLBA
Answers
Suggested answer: C
asked 18/09/2024
Jovin Jose
32 questions

Question 44

Report
Export
Collapse

Which of the following steps is the initial step in developing an information security strategy?

A.
Perform a technical vulnerabilities assessment.
A.
Perform a technical vulnerabilities assessment.
Answers
B.
Assess the current levels of security awareness.
B.
Assess the current levels of security awareness.
Answers
C.
Perform a business impact analysis.
C.
Perform a business impact analysis.
Answers
D.
Analyze the current business strategy.
D.
Analyze the current business strategy.
Answers
Suggested answer: D
asked 18/09/2024
Loyston Mathias
41 questions

Question 45

Report
Export
Collapse

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution.

Choose three.

A.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
A.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
Answers
B.
It determines the actions and behaviors of a single individual within a system
B.
It determines the actions and behaviors of a single individual within a system
Answers
C.
It ensures that modifications are not made to data by unauthorized personnel or processes.
C.
It ensures that modifications are not made to data by unauthorized personnel or processes.
Answers
D.
It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
D.
It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
Answers
Suggested answer: A, C, D
asked 18/09/2024
Cesar Augusto Veliz Reyes
44 questions

Question 46

Report
Export
Collapse

Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

A.
Cost Plus Fixed Fee
A.
Cost Plus Fixed Fee
Answers
B.
Cost Plus Percentage of Cost
B.
Cost Plus Percentage of Cost
Answers
C.
Cost Plus Incentive Fee
C.
Cost Plus Incentive Fee
Answers
D.
Cost Plus Award Fee
D.
Cost Plus Award Fee
Answers
Suggested answer: B
asked 18/09/2024
Zaccheri Brown
34 questions

Question 47

Report
Export
Collapse

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A.
IFB
A.
IFB
Answers
B.
RFQ
B.
RFQ
Answers
C.
RFP
C.
RFP
Answers
D.
RFI
D.
RFI
Answers
Suggested answer: D
asked 18/09/2024
Scott Wells
38 questions

Question 48

Report
Export
Collapse

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

A.
IP spoofing
A.
IP spoofing
Answers
B.
Broadcast storm
B.
Broadcast storm
Answers
C.
Password sniffing
C.
Password sniffing
Answers
D.
DoS attack
D.
DoS attack
Answers
Suggested answer: A, C
asked 18/09/2024
MARCOS ALAMOS
33 questions

Question 49

Report
Export
Collapse

What is a stakeholder analysis chart?

A.
It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
A.
It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
Answers
B.
It is a matrix that identifies all of the stakeholders and to whom they must report to.
B.
It is a matrix that identifies all of the stakeholders and to whom they must report to.
Answers
C.
It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.
C.
It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.
Answers
D.
It is a matrix that identifies who must communicate with whom.
D.
It is a matrix that identifies who must communicate with whom.
Answers
Suggested answer: A
asked 18/09/2024
Matthew Isaacs
37 questions

Question 50

Report
Export
Collapse

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A.
Disaster Recovery Plan
A.
Disaster Recovery Plan
Answers
B.
Continuity of Operations Plan
B.
Continuity of Operations Plan
Answers
C.
Contingency Plan
C.
Contingency Plan
Answers
D.
Business Continuity Plan
D.
Business Continuity Plan
Answers
Suggested answer: D
asked 18/09/2024
Kameron Katoku
47 questions
Total 218 questions
Go to page: of 22