ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication. Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.

Internet telephony
Internet telephony
Instant messaging
Instant messaging
Electronic mail
Electronic mail
Post-it note
Post-it note
Blogs
Blogs
Internet teleconferencing
Internet teleconferencing
Suggested answer: A, B, C, E, F
asked 18/09/2024
Ridwan Sulaiman
40 questions

Question 42

Report Export Collapse

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

Mitigation
Mitigation
Sharing
Sharing
Acceptance
Acceptance
Transference
Transference
Suggested answer: B
asked 18/09/2024
Lee, Eduardo
55 questions

Question 43

Report Export Collapse

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

HIPAA
HIPAA
COPPA
COPPA
FERPA
FERPA
GLBA
GLBA
Suggested answer: C
asked 18/09/2024
Jovin Jose
36 questions

Question 44

Report Export Collapse

Which of the following steps is the initial step in developing an information security strategy?

Perform a technical vulnerabilities assessment.
Perform a technical vulnerabilities assessment.
Assess the current levels of security awareness.
Assess the current levels of security awareness.
Perform a business impact analysis.
Perform a business impact analysis.
Analyze the current business strategy.
Analyze the current business strategy.
Suggested answer: D
asked 18/09/2024
Loyston Mathias
43 questions

Question 45

Report Export Collapse

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution.

Choose three.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
It determines the actions and behaviors of a single individual within a system
It determines the actions and behaviors of a single individual within a system
It ensures that modifications are not made to data by unauthorized personnel or processes.
It ensures that modifications are not made to data by unauthorized personnel or processes.
It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
Suggested answer: A, C, D
asked 18/09/2024
Cesar Augusto Veliz Reyes
52 questions

Question 46

Report Export Collapse

Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

Cost Plus Fixed Fee
Cost Plus Fixed Fee
Cost Plus Percentage of Cost
Cost Plus Percentage of Cost
Cost Plus Incentive Fee
Cost Plus Incentive Fee
Cost Plus Award Fee
Cost Plus Award Fee
Suggested answer: B
asked 18/09/2024
Zaccheri Brown
37 questions

Question 47

Report Export Collapse

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

IFB
IFB
RFQ
RFQ
RFP
RFP
RFI
RFI
Suggested answer: D
asked 18/09/2024
Scott Wells
46 questions

Question 48

Report Export Collapse

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

IP spoofing
IP spoofing
Broadcast storm
Broadcast storm
Password sniffing
Password sniffing
DoS attack
DoS attack
Suggested answer: A, C
asked 18/09/2024
MARCOS ALAMOS
41 questions

Question 49

Report Export Collapse

What is a stakeholder analysis chart?

It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
It is a matrix that identifies all of the stakeholders and to whom they must report to.
It is a matrix that identifies all of the stakeholders and to whom they must report to.
It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.
It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.
It is a matrix that identifies who must communicate with whom.
It is a matrix that identifies who must communicate with whom.
Suggested answer: A
asked 18/09/2024
Matthew Isaacs
45 questions

Question 50

Report Export Collapse

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Disaster Recovery Plan
Disaster Recovery Plan
Continuity of Operations Plan
Continuity of Operations Plan
Contingency Plan
Contingency Plan
Business Continuity Plan
Business Continuity Plan
Suggested answer: D
asked 18/09/2024
Kameron Katoku
50 questions
Total 218 questions
Go to page: of 22
Search

Related questions