Exam Code: CISSP-ISSMP (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Information Systems Security Management Professional
Certification Provider: ISC2
Free Today! Guaranteed Training- Pass CISSP-ISSMP Exam.

Q9. Mark works as a security manager for SofTech Inc. He is working in a partially equipped office space which contains some of the system hardware, software, telecommunications, and power sources. In which of the following types of office sites is he working?

A. Mobile site

B. Warm site

C. Cold site

D. Hot site 

Answer:


Q10. Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

A. Cold sites arrangement

B. Business impact analysis

C. Duplicate processing facilities

D. Reciprocal agreements 

Answer: D


Q11. Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

A. TLS

B. PGP

C. S/MIME

D. IPSec

Answer: B,C 


Q12. You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A. Operational audit

B. Dependent audit

C. Non-operational audit

D. Independent audit 

Answer:


Q13. You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

A. It improves the possibility for career advancement of the IT staff.

B. It improves the security of vendor relations.

C. It improves the performance of a company's intranet.

D. It improves awareness of the need to protect system resources. 

Answer: D


Q14. Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

A. Monitor and Control Risks

B. Identify Risks

C. Perform Qualitative Risk Analysis

D. Perform Quantitative Risk Analysis 

Answer: A


Q15. Which of the following relies on a physical characteristic of the user to verify his identity?

A. Social Engineering

B. Kerberos v5

C. Biometrics

D. CHAP

Answer:


Q16. Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A. PROTECT Act

B. Sexual Predators Act

C. Civil Rights Act of 1991

D. The USA Patriot Act of 2001 

Answer: C