Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISSMP Exam Dumps - Information Systems Security Management Professional

Question # 4

You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?

A.

Preserve the email server including all logs.

B.

Seize the employee's PC.

C.

Make copies of that employee's email.

D.

Place spyware on the employee's PC to confirm these activities.

Full Access
Question # 5

Which of the following needs to be documented to preserve evidences for presentation in court?

A.

Separation of duties

B.

Account lockout policy

C.

Incident response policy

D.

Chain of custody

Full Access
Question # 6

Which of the following statements reflect the 'Code of Ethics Canons' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution. Choose all that apply.

A.

Provide diligent and competent service to principals.

B.

Protect society, the commonwealth, and the infrastructure.

C.

Give guidance for resolving good versus good and bad versus bad dilemmas.

D.

Act honorably, honestly, justly, responsibly, and legally.

Full Access
Question # 7

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that apply.

A.

Preparea chain of custody and handle the evidence carefully.

B.

Examine original evidence and never rely on the duplicate evidence.

C.

Never exceed the knowledge base of the forensic investigation.

D.

Follow the rules of evidence and never temper with the evidence.

Full Access
Question # 8

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

A.

Quantitative risk analysis

B.

Qualitative risk analysis

C.

Requested changes

D.

Risk audits

Full Access
Question # 9

Which of the following penetration testing phases involves reconnaissance or data gathering?

A.

Attack phase

B.

Pre-attack phase

C.

Post-attack phase

D.

Out-attack phase

Full Access
Question # 10

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

A.

Spam

B.

Patent

C.

Artistic license

D.

Phishing

Full Access
Question # 11

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

A.

18 U.S.C. 1362

B.

18 U.S.C. 1030

C.

18 U.S.C. 1029

D.

18 U.S.C. 2701

E.

18 U.S.C. 2510

Full Access
Question # 12

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

A.

SSAA

B.

FITSAF

C.

FIPS

D.

TCSEC

Full Access
Question # 13

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

A.

It improves the possibility for career advancement of the IT staff.

B.

It improves the security of vendor relations.

C.

It improves the performance of a company's intranet.

D.

It improves awareness of the need to protect system resources.

Full Access
Question # 14

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

A.

Programming and training

B.

Evaluation and acceptance

C.

Definition

D.

Initiation

Full Access
Question # 15

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

A.

Configuration Verification and Auditing

B.

Configuration Item Costing

C.

Configuration Identification

D.

Configuration Status Accounting

Full Access
Question # 16

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.

Packet filtering

B.

Tunneling

C.

Packet sniffing

D.

Spoofing

Full Access
Question # 17

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

A.

Protect an organization from major computer services failure.

B.

Minimizethe risk to the organization from delays in providing services.

C.

Guarantee the reliability of standby systems through testing and simulation.

D.

Maximize the decision-making required by personnel during a disaster.

Full Access
Question # 18

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

A.

Patent

B.

Utility model

C.

Snooping

D.

Copyright

Full Access
Question # 19

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A.

Code Security law

B.

Trademark laws

C.

Copyright laws

D.

Patent laws

Full Access
Question # 20

Which of the following security models focuses on data confidentiality and controlled access to classified information?

A.

Bell-La Padula model

B.

Take-Grant model

C.

Clark-Wilson model

D.

Biba model

Full Access
Question # 21

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

A.

Mitigation

B.

Sharing

C.

Acceptance

D.

Transference

Full Access
Question # 22

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

A.

Cold sites arrangement

B.

Business impact analysis

C.

Duplicate processing facilities

D.

Reciprocal agreements

Full Access
Question # 23

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

A.

Emergency-management team

B.

Damage-assessment team

C.

Off-site storage team

D.

Emergency action team

Full Access
Question # 24

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart?

A.

Quantitative analysis

B.

Contingency reserve

C.

Risk response

D.

Risk response plan

Full Access
Question # 25

Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?

A.

Senior Management

B.

Business Unit Manager

C.

Information Security Steering Committee

D.

Chief Information Security Officer

Full Access
Question # 26

You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?

A.

Implement separation of duties.

B.

Implement RBAC.

C.

Implement three way authentication.

D.

Implement least privileges.

Full Access
Question # 27

Which of the following measurements of an enterprise's security state is the process whereby an organization establishes the parameters within which programs, investments, and acquisitions reach the desired results?

A.

Information sharing

B.

Ethics

C.

Performance measurement

D.

Risk management

Full Access
Question # 28

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

A.

NSA-IAM

B.

DITSCAP

C.

ASSET

D.

NIACAP

Full Access
Question # 29

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

A.

HIPAA

B.

COPPA

C.

FERPA

D.

GLBA

Full Access
Question # 30

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

A.

UDP port 161

B.

TCP port 443

C.

TCP port 110

D.

UDP port 1701

Full Access
Question # 31

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

A.

OPSEC assessment

Full Access
Question # 32

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project contractual relationship with the vendor

B.

Project management plan

C.

Project communications plan

D.

Project scope statement

Full Access