ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 8

List of questions

Question 71

Report Export Collapse

Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.

Assuring the integrity of organizational data
Assuring the integrity of organizational data
Building Risk free systems
Building Risk free systems
Risk control
Risk control
Risk identification
Risk identification
Suggested answer: C, D
asked 18/09/2024
Robert McConnell
37 questions

Question 72

Report Export Collapse

Which of the following statements best describes the consequences of the disaster recovery plan test?

If no deficiencies were found during the test, then the test was probably flawed.
If no deficiencies were found during the test, then the test was probably flawed.
The plan should not be changed no matter what the results of the test would be.
The plan should not be changed no matter what the results of the test would be.
The results of the test should be kept secret.
The results of the test should be kept secret.
If no deficiencies were found during the test, then the plan is probably perfect.
If no deficiencies were found during the test, then the plan is probably perfect.
Suggested answer: A
asked 18/09/2024
Antonio Agustin Mirano
38 questions

Question 73

Report Export Collapse

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

UDP port 161
UDP port 161
TCP port 443
TCP port 443
TCP port 110
TCP port 110
UDP port 1701
UDP port 1701
Suggested answer: D
asked 18/09/2024
Daniela Const
46 questions

Question 74

Report Export Collapse

Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution.

Choose all that apply.

Provide diligent and competent service to principals.
Provide diligent and competent service to principals.
Protect society, the commonwealth, and the infrastructure.
Protect society, the commonwealth, and the infrastructure.
Give guidance for resolving good versus good and bad versus bad dilemmas.
Give guidance for resolving good versus good and bad versus bad dilemmas.
Act honorably, honestly, justly, responsibly, and legally.
Act honorably, honestly, justly, responsibly, and legally.
Suggested answer: A, B, D
asked 18/09/2024
Herr Alexandre Fleider
46 questions

Question 75

Report Export Collapse

Which of the following issues are addressed by the change control phase in the maintenance phase of the life cycle models? Each correct answer represents a complete solution. Choose all that apply.

Performing quality control
Performing quality control
Recreating and analyzing the problem
Recreating and analyzing the problem
Developing the changes and corresponding tests
Developing the changes and corresponding tests
Establishing the priorities of requests
Establishing the priorities of requests
Suggested answer: A, B, C
asked 18/09/2024
Mashudu Abraham
39 questions

Question 76

Report Export Collapse

Which of the following statements about Due Care policy is true?

It is a method used to authenticate users on a network.
It is a method used to authenticate users on a network.
It is a method for securing database servers.
It is a method for securing database servers.
It identifies the level of confidentiality of information.
It identifies the level of confidentiality of information.
It provides information about new viruses.
It provides information about new viruses.
Suggested answer: C
asked 18/09/2024
mohamed elfateh
38 questions

Question 77

Report Export Collapse

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

Configuration Verification and Auditing
Configuration Verification and Auditing
Configuration Item Costing
Configuration Item Costing
Configuration Identification
Configuration Identification
Configuration Status Accounting
Configuration Status Accounting
Suggested answer: B
asked 18/09/2024
leconte maxime
40 questions

Question 78

Report Export Collapse

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

Maintain and Monitor
Maintain and Monitor
Organization Vulnerability
Organization Vulnerability
Define Policy
Define Policy
Baseline the Environment
Baseline the Environment
Suggested answer: A, C, D
asked 18/09/2024
Michael Akinpelu
36 questions

Question 79

Report Export Collapse

Which of the following is a documentation of guidelines that are used to create archival copies of important data?

User policy
User policy
Security policy
Security policy
Audit policy
Audit policy
Backup policy
Backup policy
Suggested answer: D
asked 18/09/2024
John Hart
55 questions

Question 80

Report Export Collapse

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

Outsource
Outsource
Proposal
Proposal
Contract
Contract
Service level agreement
Service level agreement
Suggested answer: C
asked 18/09/2024
Edmond Chui
39 questions
Total 218 questions
Go to page: of 22

Related questions