ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

A.
Cost
A.
Cost
Answers
B.
Resources
B.
Resources
Answers
C.
Contract
C.
Contract
Answers
D.
Schedule
D.
Schedule
Answers
Suggested answer: C

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

A.
The Configuration Manager
A.
The Configuration Manager
Answers
B.
The Supplier Manager
B.
The Supplier Manager
Answers
C.
The Service Catalogue Manager
C.
The Service Catalogue Manager
Answers
D.
The IT Service Continuity Manager
D.
The IT Service Continuity Manager
Answers
Suggested answer: B

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

A.
Initiation Phase
A.
Initiation Phase
Answers
B.
Development/Acquisition Phase
B.
Development/Acquisition Phase
Answers
C.
Implementation Phase
C.
Implementation Phase
Answers
D.
Operation/Maintenance Phase
D.
Operation/Maintenance Phase
Answers
Suggested answer: C

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

A.
Malicious Communications Act (1998)
A.
Malicious Communications Act (1998)
Answers
B.
Anti-Cyber-Stalking law (1999)
B.
Anti-Cyber-Stalking law (1999)
Answers
C.
Stalking Amendment Act (1999)
C.
Stalking Amendment Act (1999)
Answers
D.
Stalking by Electronic Communications Act (2001)
D.
Stalking by Electronic Communications Act (2001)
Answers
Suggested answer: C

Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?

A.
CSIRT
A.
CSIRT
Answers
B.
CERT
B.
CERT
Answers
C.
FIRST
C.
FIRST
Answers
D.
FedCIRC
D.
FedCIRC
Answers
Suggested answer: C

Which of the following statements is related with the first law of OPSEC?

A.
If you are not protecting it (the critical and sensitive information), the adversary wins!
A.
If you are not protecting it (the critical and sensitive information), the adversary wins!
Answers
B.
If you don't know what to protect, how do you know you are protecting it?
B.
If you don't know what to protect, how do you know you are protecting it?
Answers
C.
If you don't know about your security resources you could not protect your network.
C.
If you don't know about your security resources you could not protect your network.
Answers
D.
If you don't know the threat, how do you know what to protect?
D.
If you don't know the threat, how do you know what to protect?
Answers
Suggested answer: D

Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes. Who decides the category of a change?

A.
The Problem Manager
A.
The Problem Manager
Answers
B.
The Process Manager
B.
The Process Manager
Answers
C.
The Change Manager
C.
The Change Manager
Answers
D.
The Service Desk
D.
The Service Desk
Answers
E.
The Change Advisory Board
E.
The Change Advisory Board
Answers
Suggested answer: C

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/ person?

A.
Direct
A.
Direct
Answers
B.
Circumstantial
B.
Circumstantial
Answers
C.
Incontrovertible
C.
Incontrovertible
Answers
D.
Corroborating
D.
Corroborating
Answers
Suggested answer: B

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A.
PROTECT Act
A.
PROTECT Act
Answers
B.
Sexual Predators Act
B.
Sexual Predators Act
Answers
C.
Civil Rights Act of 1991
C.
Civil Rights Act of 1991
Answers
D.
The USA Patriot Act of 2001
D.
The USA Patriot Act of 2001
Answers
Suggested answer: C

Which of the following policies helps reduce the potential damage from the actions of one person?

A.
CSA
A.
CSA
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Separation of duties
C.
Separation of duties
Answers
D.
Internal audit
D.
Internal audit
Answers
Suggested answer: C
Total 218 questions
Go to page: of 22