ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication. Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.

A.
Internet telephony
A.
Internet telephony
Answers
B.
Instant messaging
B.
Instant messaging
Answers
C.
Electronic mail
C.
Electronic mail
Answers
D.
Post-it note
D.
Post-it note
Answers
E.
Blogs
E.
Blogs
Answers
F.
Internet teleconferencing
F.
Internet teleconferencing
Answers
Suggested answer: A, B, C, E, F

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

A.
Mitigation
A.
Mitigation
Answers
B.
Sharing
B.
Sharing
Answers
C.
Acceptance
C.
Acceptance
Answers
D.
Transference
D.
Transference
Answers
Suggested answer: B

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

A.
HIPAA
A.
HIPAA
Answers
B.
COPPA
B.
COPPA
Answers
C.
FERPA
C.
FERPA
Answers
D.
GLBA
D.
GLBA
Answers
Suggested answer: C

Which of the following steps is the initial step in developing an information security strategy?

A.
Perform a technical vulnerabilities assessment.
A.
Perform a technical vulnerabilities assessment.
Answers
B.
Assess the current levels of security awareness.
B.
Assess the current levels of security awareness.
Answers
C.
Perform a business impact analysis.
C.
Perform a business impact analysis.
Answers
D.
Analyze the current business strategy.
D.
Analyze the current business strategy.
Answers
Suggested answer: D

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution.

Choose three.

A.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
A.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
Answers
B.
It determines the actions and behaviors of a single individual within a system
B.
It determines the actions and behaviors of a single individual within a system
Answers
C.
It ensures that modifications are not made to data by unauthorized personnel or processes.
C.
It ensures that modifications are not made to data by unauthorized personnel or processes.
Answers
D.
It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
D.
It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
Answers
Suggested answer: A, C, D

Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

A.
Cost Plus Fixed Fee
A.
Cost Plus Fixed Fee
Answers
B.
Cost Plus Percentage of Cost
B.
Cost Plus Percentage of Cost
Answers
C.
Cost Plus Incentive Fee
C.
Cost Plus Incentive Fee
Answers
D.
Cost Plus Award Fee
D.
Cost Plus Award Fee
Answers
Suggested answer: B

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A.
IFB
A.
IFB
Answers
B.
RFQ
B.
RFQ
Answers
C.
RFP
C.
RFP
Answers
D.
RFI
D.
RFI
Answers
Suggested answer: D

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

A.
IP spoofing
A.
IP spoofing
Answers
B.
Broadcast storm
B.
Broadcast storm
Answers
C.
Password sniffing
C.
Password sniffing
Answers
D.
DoS attack
D.
DoS attack
Answers
Suggested answer: A, C

What is a stakeholder analysis chart?

A.
It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
A.
It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
Answers
B.
It is a matrix that identifies all of the stakeholders and to whom they must report to.
B.
It is a matrix that identifies all of the stakeholders and to whom they must report to.
Answers
C.
It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.
C.
It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place.
Answers
D.
It is a matrix that identifies who must communicate with whom.
D.
It is a matrix that identifies who must communicate with whom.
Answers
Suggested answer: A

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A.
Disaster Recovery Plan
A.
Disaster Recovery Plan
Answers
B.
Continuity of Operations Plan
B.
Continuity of Operations Plan
Answers
C.
Contingency Plan
C.
Contingency Plan
Answers
D.
Business Continuity Plan
D.
Business Continuity Plan
Answers
Suggested answer: D
Total 218 questions
Go to page: of 22