Free Information Systems Security Management Professional Exam ISSMP Exam Practice Test

UNLOCK FULL
ISSMP Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 45
Total Questions: 224
  • What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?A . ZOPAB . PONC . BiasD . BATNA

    Answer: D Next Question
  • Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open issues in the project and how the resolution of the issues may lead to additional project changes. On what document are Tomas and the stakeholders working in this scenario?A . Communications management planB . Change management planC . Issue logD . Risk management plan

    Answer: B Next Question
  • Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?A . Managed levelB . Defined levelC . Fundamental levelD . Repeatable level

    Answer: C Next Question
  • Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'?Each correct answer represents a complete solution. Choose all that apply.A . Provide diligent and competent service to principals.B . Protect society, the commonwealth, and the infrastructure.C . Give guidance for resolving good versus good and bad versus bad dilemmas.D . Act honorably, honestly, justly, responsibly, and legally.

    Answer: A, ,B, ,D Next Question
  • Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?A . SSAAB . FITSAFC . FIPSD . TCSEC

    Answer: A Next Question
  • You work as a Web Administrator for Perfect World Inc. The company is planning to host an E- commerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it?Each correct answer represents a part of the solution. Choose two.A . Use encrypted authentication. B . Use the SSL protocol.C . Use the EAP protocol.D . Use Basic authentication.

    Answer: A, ,B Next Question
  • You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?A . CostB . ResourcesC . ContractD . Schedule

    Answer: C Next Question
  • Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?A . Risk mitigation B . Risk transferC . Risk acceptanceD . Risk avoidance

    Answer: B Next Question
  • Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.A . Biba-WilsonB . Clark-WilsonC . Bell-LaPadulaD . Biba

    Answer: B, ,D Next Question
  • Which of the following statements about the integrity concept of information security management are true?Each correct answer represents a complete solution. Choose three.A . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.B . It determines the actions and behaviors of a single individual within a systemC . It ensures that modifications are not made to data by unauthorized personnel or processes.D . It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

    Answer: A, ,C, ,D Next Question
Page: 1 / 45
Total Questions: 224