Download Information Systems Security Management Professional.CISSP-ISSMP.TestKing.2018-11-27.132q.vcex

Vendor: ISC
Exam Code: CISSP-ISSMP
Exam Name: Information Systems Security Management Professional
Date: Nov 27, 2018
File Size: 110 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which of the following is the best method to stop vulnerability attacks on a Web server?  
  1. Using strong passwords
  2. Configuring a firewall
  3. Implementing the latest virus scanner
  4. Installing service packs and updates
Correct answer: D
Question 2
Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?
  1. Managed level
  2. Defined level
  3. Fundamental level
  4. Repeatable level
Correct answer: C
Question 3
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
  1. Emergency-management team
  2. Damage-assessment team
  3. Off-site storage team
  4. Emergency action team
Correct answer: D
Question 4
Which of the following security models dictates that subjects can only access objects through applications?
  1. Biba-Clark model
  2. Bell-LaPadula
  3. Clark-Wilson
  4. Biba model
Correct answer: C
Question 5
Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.
  1. Data downloading from the Internet
  2. File and object access
  3. Network logons and logoffs
  4. Printer access
Correct answer: BCD
Question 6
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. 
What type of security audit do you need to conduct to resolve the problem?
  1. Operational audit
  2. Dependent audit
  3. Non-operational audit
  4. Independent audit
Correct answer: D
Question 7
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?
  1. Gramm-Leach-Bliley Act
  2. Computer Fraud and Abuse Act
  3. Computer Security Act
  4. Digital Millennium Copyright Act
Correct answer: B
Question 8
Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.
  1. Life cycle
Correct answer: 1
Question 9
You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:
  
How much capital should the project set aside for the risk contingency reserve?  
  1. $142,000
  2. $232,000
  3. $41,750
  4. $23,750
Correct answer: D
Explanation:
Question 10
Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.
  1. It can be achieved by installing service packs and security updates on a regular basis.
  2. It is used for securing the computer hardware.
  3. It can be achieved by locking the computer room.
  4. It is used for securing an operating system.
Correct answer: AD
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!