New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Note: This exam is available on Demand only. You can Pre-Order this Exam and we will arrange this for you. Buy Now

ISSMP Questions and Answers

Question # 6

Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due?

A.

Expected breach

B.

Actual breach

C.

Anticipatory breach

D.

Nonperforming breach

Full Access
Question # 7

Which of the following options is an approach to restricting system access to authorized users?

A.

DAC

B.

MIC

C.

RBAC

D.

MAC

Full Access
Question # 8

James works as a security manager for SoftTech Inc. He has been working on the continuous process improvement and on the ordinal scale for measuring the maturity of the organization involved in the software processes. According to James, which of the following maturity levels of software CMM focuses on the continuous process improvement?

A.

Repeatable level

B.

Defined level

C.

Initiating level

D.

Optimizing level

Full Access
Question # 9

You are the Network Administrator for a software company. Due to the nature of your company's business, you have a significant number of highly computer savvy users. However, you have still decided to limit each user access to only those resources required for their job, rather than give wider access to the technical users (such as tech support and software engineering personnel). What is this an example of?

A.

The principle of maximum control.

B.

The principle of least privileges.

C.

Proper use of an ACL.

D.

Poor resource management.

Full Access
Question # 10

Which of the following relies on a physical characteristic of the user to verify his identity?

A.

Social Engineering

B.

Kerberos v5

C.

Biometrics

D.

CHAP

Full Access
Question # 11

Which of the following laws is defined as the Law of Nations or the legal norms that has developed through the customary exchanges between states over time, whether based on diplomacy or aggression?

A.

Customary

B.

Tort

C.

Criminal

D.

Administrative

Full Access
Question # 12

Which of the following statements about the availability concept of Information security management is true?

A.

It determines actions and behaviors of a single individual within a system.

B.

It ensures reliable and timely access to resources.

C.

It ensures that unauthorized modifications are not made to data byauthorized personnel or processes.

D.

It ensures that modifications are not made to data by unauthorized personnel or processes.

Full Access
Question # 13

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

A.

Copyright law

B.

Trademark law

C.

Privacy law

D.

Security law

Full Access
Question # 14

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

A.

Scope Verification

B.

Project Management Information System

C.

Integrated Change Control

D.

Configuration Management System

Full Access
Question # 15

Which of the following statements reflect the 'Code of Ethics Preamble' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution. Choose all that apply.

A.

Strict adherence to this Code is a condition of certification.

B.

Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.

C.

Advance and protect the profession.

D.

Provide diligent and competent service to principals.

Full Access
Question # 16

Which of the following is a name, symbol, or slogan with which a product is identified?

A.

Copyright

B.

Trademark

C.

Trade secret

D.

Patent

Full Access
Question # 17

Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?

A.

Cold sites

B.

Orange sites

C.

Warm sites

D.

Duplicate processing facilities

Full Access
Question # 18

Which of the following are the responsibilities of the owner with regard to data in an information classification program? Each correct answer represents a complete solution. Choose three.

A.

Determining what level of classification the information requires.

B.

Delegating the responsibility of the data protection duties to a custodian.

C.

Reviewing the classification assignments at regular time intervals and making changes as the business needs change.

D.

Running regular backups and routinely testing the validity of the backup data.

Full Access
Question # 19

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

Phishing

B.

Wiretapping

C.

SMB signing

D.

Spoofing

Full Access
Question # 20

You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your company. You have completed the risk analysis processes for the risk events. You and the project team have created risk responses for most of the identified project risks. Which of the following risk response planning techniques will you use to shift the impact of a threat to a third party, together with the responses?

A.

Risk mitigation

B.

Risk acceptance

C.

Risk avoidance

D.

Risk transference

Full Access
Question # 21

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

A.

Data diddling

B.

Wiretapping

C.

Eavesdropping

D.

Spoofing

Full Access
Question # 22

Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.

A.

Assessing the impact of potential threats

B.

Identifying the accused

C.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

D.

Identifying the risk

Full Access
Question # 23

Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?

A.

A risk audit is a review of all the risks that have yet to occur and what their probability of happening are.

B.

A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.

C.

A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.

D.

A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.

Full Access
Question # 24

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

A.

Outsource

B.

Proposal

C.

Contract

D.

Service level agreement

Full Access
Question # 25

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

A.

The Configuration Manager

B.

The Supplier Manager

C.

The Service Catalogue Manager

D.

The IT Service Continuity Manager

Full Access
Question # 26

A contract cannot have provisions for which one of the following?

A.

Subcontracting the work

B.

Penalties and fines for disclosure of intellectual rights

C.

A deadline for the completion of the work

D.

Illegal activities

Full Access
Question # 27

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

A.

Take-Grant Protection Model

B.

Bell-LaPadula Model

C.

Biba Integrity Model

D.

Access Matrix

Full Access
Question # 28

Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

A.

Risk register

B.

Risk management plan

C.

Quality management plan

D.

Project charter

Full Access
Question # 29

Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.

A.

Acquire

B.

Analyze

C.

Authenticate

D.

Encrypt

Full Access
Question # 30

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A.

Operational audit

B.

Dependent audit

C.

Non-operational audit

D.

Independent audit

Full Access
Question # 31

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project contractual relationship with the vendor

B.

Project management plan

C.

Project communications plan

D.

Project scope statement

Full Access
Question # 32

Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution. Choose all that apply.

A.

Provide diligent and competent service to principals.

B.

Protect society, the commonwealth, and the infrastructure.

C.

Give guidance for resolving good versus good and bad versus bad dilemmas.

D.

Act honorably, honestly, justly, responsibly, and legally.

Full Access