ISC2 ISSMP Information Systems Security Management Professional CISSP-ISSMP Exam Practice Test

Page: 1 / 14
Total 218 questions
Question 1

Which of the following security models dictates that subjects can only access objects through applications?



Answer : C


Question 2

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."



Answer : A


Question 3

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?



Answer : B


Question 4

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?



Answer : B


Question 5

Which of the following is a process of monitoring data packets that travel across a network?



Answer : B


Question 6

Which of the following policies helps reduce the potential damage from the actions of one person?



Answer : C


Question 7

Which of the following signatures watches for the connection attempts to well-known, frequently attacked ports?



Answer : A


Page:    1 / 14   
Total 218 questions