Pass4itsure > ISC > ISC Certification > ISSMP > ISSMP Online Practice Questions and Answers

ISSMP Online Practice Questions and Answers

Questions 4

SIMULATION Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct

Buy Now
Questions 5

Which of the following is a variant with regard to Configuration Management?

A. A CI that has the same name as another CI but shares no relationship.

B. A CI that particularly refers to a hardware specification.

C. A CI that has the same essential functionality as another CI but a bit different in some small manner.

D. A CI that particularly refers to a software version.

Buy Now
Questions 6

Which of the following is the default port for Secure Shell (SSH)?

A. UDP port 161

B. TCP port 22

C. UDP port 138

D. TCP port 443

Buy Now
Questions 7

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

A. Password policies

B. Vulnerability assessments

C. Data encryption

D. Data classification

Buy Now
Questions 8

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

A. NSA-IAM

B. DITSCAP

C. ASSET

D. NIACAP

Buy Now
Questions 9

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

A. Shielding

B. Spoofing

C. Eavesdropping

D. Packaging

Buy Now
Questions 10

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A. Business continuity plan

B. Disaster recovery plan

C. Continuity of Operations Plan

D. Contingency plan

Buy Now
Questions 11

Which of the following relies on a physical characteristic of the user to verify his identity?

A. Social Engineering

B. Kerberos v5

C. Biometrics

D. CHAP

Buy Now
Questions 12

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A. Disaster Recovery Plan

B. Continuity of Operations Plan

C. Contingency Plan

D. Business Continuity Plan

Buy Now
Questions 13

Which of the following policies helps reduce the potential damage from the actions of one person?

A. CSA

B. Risk assessment

C. Separation of duties

D. Internal audit

Buy Now
Exam Code: ISSMP
Exam Name: ISSMP:Information Systems Security Management Professional
Last Update: Apr 26, 2024
Questions: 224
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99