ISC2 Information Systems Security Management Professional ISSMP CISSP-ISSMP Exam Practice Test

Page: 1 / 14
Total 218 questions
Question 1

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.



Answer : B, C, D


Question 2

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1.To account for all IT assets 2.To provide precise information support to other ITIL disciplines 3.To provide a solid base only for Incident and Problem Management 4.To verify configuration records and correct any exceptions



Answer : C


Question 3

Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?



Answer : A


Question 4

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?



Answer : B


Question 5

Fill in the blank with an appropriate phrase.______________ is used to provide security mechanisms for the storage, processing, and transfer of data.



Answer : A


Question 6

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?



Answer : D


Question 7

Which of the following security models focuses on data confidentiality and controlled access to classified information?



Answer : A


Page:    1 / 14   
Total 218 questions