ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.

A.
Assuring the integrity of organizational data
A.
Assuring the integrity of organizational data
Answers
B.
Building Risk free systems
B.
Building Risk free systems
Answers
C.
Risk control
C.
Risk control
Answers
D.
Risk identification
D.
Risk identification
Answers
Suggested answer: C, D

Which of the following statements best describes the consequences of the disaster recovery plan test?

A.
If no deficiencies were found during the test, then the test was probably flawed.
A.
If no deficiencies were found during the test, then the test was probably flawed.
Answers
B.
The plan should not be changed no matter what the results of the test would be.
B.
The plan should not be changed no matter what the results of the test would be.
Answers
C.
The results of the test should be kept secret.
C.
The results of the test should be kept secret.
Answers
D.
If no deficiencies were found during the test, then the plan is probably perfect.
D.
If no deficiencies were found during the test, then the plan is probably perfect.
Answers
Suggested answer: A

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

A.
UDP port 161
A.
UDP port 161
Answers
B.
TCP port 443
B.
TCP port 443
Answers
C.
TCP port 110
C.
TCP port 110
Answers
D.
UDP port 1701
D.
UDP port 1701
Answers
Suggested answer: D

Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution.

Choose all that apply.

A.
Provide diligent and competent service to principals.
A.
Provide diligent and competent service to principals.
Answers
B.
Protect society, the commonwealth, and the infrastructure.
B.
Protect society, the commonwealth, and the infrastructure.
Answers
C.
Give guidance for resolving good versus good and bad versus bad dilemmas.
C.
Give guidance for resolving good versus good and bad versus bad dilemmas.
Answers
D.
Act honorably, honestly, justly, responsibly, and legally.
D.
Act honorably, honestly, justly, responsibly, and legally.
Answers
Suggested answer: A, B, D

Which of the following issues are addressed by the change control phase in the maintenance phase of the life cycle models? Each correct answer represents a complete solution. Choose all that apply.

A.
Performing quality control
A.
Performing quality control
Answers
B.
Recreating and analyzing the problem
B.
Recreating and analyzing the problem
Answers
C.
Developing the changes and corresponding tests
C.
Developing the changes and corresponding tests
Answers
D.
Establishing the priorities of requests
D.
Establishing the priorities of requests
Answers
Suggested answer: A, B, C

Which of the following statements about Due Care policy is true?

A.
It is a method used to authenticate users on a network.
A.
It is a method used to authenticate users on a network.
Answers
B.
It is a method for securing database servers.
B.
It is a method for securing database servers.
Answers
C.
It identifies the level of confidentiality of information.
C.
It identifies the level of confidentiality of information.
Answers
D.
It provides information about new viruses.
D.
It provides information about new viruses.
Answers
Suggested answer: C

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

A.
Configuration Verification and Auditing
A.
Configuration Verification and Auditing
Answers
B.
Configuration Item Costing
B.
Configuration Item Costing
Answers
C.
Configuration Identification
C.
Configuration Identification
Answers
D.
Configuration Status Accounting
D.
Configuration Status Accounting
Answers
Suggested answer: B

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

A.
Maintain and Monitor
A.
Maintain and Monitor
Answers
B.
Organization Vulnerability
B.
Organization Vulnerability
Answers
C.
Define Policy
C.
Define Policy
Answers
D.
Baseline the Environment
D.
Baseline the Environment
Answers
Suggested answer: A, C, D

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

A.
User policy
A.
User policy
Answers
B.
Security policy
B.
Security policy
Answers
C.
Audit policy
C.
Audit policy
Answers
D.
Backup policy
D.
Backup policy
Answers
Suggested answer: D

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

A.
Outsource
A.
Outsource
Answers
B.
Proposal
B.
Proposal
Answers
C.
Contract
C.
Contract
Answers
D.
Service level agreement
D.
Service level agreement
Answers
Suggested answer: C
Total 218 questions
Go to page: of 22