Free Information Systems Security Management Professional Exam ISSMP Exam Practice Test
ISSMP Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 224
-
Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?A . SLAB . NDAC . Non-price competitionD . CNC
Answer: B Next Question -
Which of the following security models dictates that subjects can only access objects through applications?A . Biba-Clark modelB . Bell-LaPadulaC . Clark-WilsonD . Biba model
Answer: C Next Question -
You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?A . Risk management planB . Lessons learned documentationC . Risk registerD . Stakeholder management strategy
Answer: C Next Question -
What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?A . ZOPAB . PONC . BiasD . BATNA
Answer: D Next Question -
Which of the following are the examples of administrative controls?Each correct answer represents a complete solution. Choose all that apply.A . Security awareness trainingB . Security policyC . Data BackupD . Auditing
Answer: A Next Question -
Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?A . Code Security lawB . Trademark lawsC . Copyright lawsD . Patent laws
Answer: D Next Question -
Which of the following statements is true about auditing?A . It is used to protect the network against virus attacks.B . It is used to track user accounts for file and object access, logon attempts, etc.C . It is used to secure the network or the computers on the network.D . It is used to prevent unauthorized access to network resources.
Answer: B Next Question -
Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?A . Second Code of Ethics CanonsB . Fourth Code of Ethics CanonsC . First Code of Ethics CanonsD . Third Code of Ethics Canons
Answer: A Next Question -
Which of the following statements about the availability concept of Information security management is true?A . It determines actions and behaviors of a single individual within a system.B . It ensures reliable and timely access to resources.C . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.D . It ensures that modifications are not made to data by unauthorized personnel or processes.
Answer: B Next Question -
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?A . Operational auditB . Dependent auditC . Non-operational auditD . Independent audit
Answer: D Next Question
Total Questions: 224