Download ISC.CertDumps.CISSP-ISSMP.2018-05-28.1e.129q.vcex

Exam Information Systems Security Management Professional
File Name ISC.CertDumps.CISSP-ISSMP.2018-05-28.1e.129q.vcex
Size 88 Kb
Posted August 08, 2018


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%

Demo Questions

Question 1

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

  • A: SSAA
  • C: FIPS
  • D: TCSEC
Question 2

Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?

  • A: Vulnerability analysis
  • B: Cost-benefit analysis
  • C: Gap analysis
  • D: Requirement analysis
Question 3

A contract cannot have provisions for which one of the following?

  • A: Subcontracting the work
  • B: Penalties and fines for disclosure of intellectual rights
  • C: A deadline for the completion of the work
  • D: Illegal activities
Question 4

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  • A: Risk mitigation
  • B: Risk transfer
  • C: Risk acceptance
  • D: Risk avoidance
Question 5

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

  • A: It improves the possibility for career advancement of the IT staff.
  • B: It improves the security of vendor relations.
  • C: It improves the performance of a company's intranet.
  • D: It improves awareness of the need to protect system resources.
Question 6

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. 
What is this called?

  • A: Availability
  • B: Encryption
  • C: Integrity
  • D: Confidentiality
Question 7

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

  • A: Scope Verification
  • B: Project Management Information System
  • C: Integrated Change Control
  • D: Configuration Management System
Question 8

Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication. Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.

  • A: Internet telephony
  • B: Instant messaging
  • C: Electronic mail
  • D: Post-it note
  • E: Blogs
  • F: Internet teleconferencing
Question 9

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. 
A teaming agreement is an example of what risk response?

  • A: Mitigation
  • B: Sharing
  • C: Acceptance
  • D: Transference
Question 10

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

  • A: HIPAA
  • B: COPPA
  • C: FERPA
  • D: GLBA