Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CISSP-ISSMP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSMP Exam Dumps - ISSMP: Information Systems Security Management Professional

Go to page:
Question # 9

Which of the following are known as the three laws of OPSEC? Each correct answer represents a part of the solution. Choose three.

A.

Ifyou don't know the threat, how do you know what to protect?

B.

If you don't know what to protect, how do you know you are protecting it?

C.

If you are not protecting it (the critical and sensitive information), the adversary wins!

D.

If you don't knowabout your security resources you cannot protect your network.

Full Access
Question # 10

Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.

A.

Acquire

B.

Analyze

C.

Authenticate

D.

Encrypt

Full Access
Question # 11

You have created a team of HR Managers and Project Managers for Blue Well Inc. The team will concentrate on hiring some new employees for the company and improving the organization's overall security by turning employees among numerous job positions. Which of the following steps will you perform to accomplish the task?

A.

Job rotation

B.

Job responsibility

C.

Screening candidates

D.

Separation of duties

Full Access
Question # 12

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project contractual relationship with the vendor

B.

Project management plan

C.

Project communications plan

D.

Project scope statement

Full Access
Question # 13

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.

Preparation

B.

Eradication

C.

Identification

D.

Containment

Full Access
Question # 14

Which of the following steps is the initial step in developing an information security strategy?

A.

Perform a technical vulnerabilities assessment.

B.

Assess the current levels of security awareness.

C.

Perform a business impact analysis.

D.

Analyze the current business strategy.

Full Access
Question # 15

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?

A.

Containment

B.

Eradication

C.

Preparation

D.

Identification

Full Access
Question # 16

Which of the following are the levels of military data classification system? Each correct answer represents a complete solution. Choose all that apply.

A.

Sensitive

B.

Top Secret

C.

Confidential

D.

Secret

E.

Unclassified

F.

Public

Full Access
Go to page: