ExamGecko
Home / ISC / CISSP-ISSMP / List of questions
Ask Question

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

Which of the following sections come under the ISO/IEC 27002 standard?

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

Which of the following access control models uses a predefined set of access privileges for an object of a system?

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

Which of the following statements about the availability concept of Information security management is true?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

Which of the following is a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

Which of the following administrative policy controls is usually associated with government classifications of materials and the clearances of individuals to access those materials?

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

Which of the following are the levels of military data classification system? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member
Total 218 questions
Go to page: of 22
Search

Related questions