Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CISSP-ISSMP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSMP Exam Dumps - ISSMP: Information Systems Security Management Professional

Go to page:
Question # 25

Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.

A.

Password policies

B.

Vulnerability assessments

C.

Data encryption

D.

Data classification

Full Access
Question # 26

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A.

Code Security law

B.

Trademark laws

C.

Copyright laws

D.

Patent laws

Full Access
Question # 27

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

A.

TLS

B.

PGP

C.

S/MIME

D.

IPSec

Full Access
Question # 28

Which of the following issues are addressed by the change control phase in the maintenance phase of the life cycle models? Each correct answer represents a complete solution. Choose all that apply.

A.

Performing quality control

B.

Recreating and analyzing the problem

C.

Developing the changes and corresponding tests

D.

Establishing the priorities of requests

Full Access
Question # 29

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

A.

Cold sites arrangement

B.

Business impact analysis

C.

Duplicate processing facilities

D.

Reciprocal agreements

Full Access
Question # 30

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

A.

Configuration management

B.

Risk management

C.

Procurement management

D.

Change management

Full Access
Question # 31

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?

A.

Gramm-Leach-Bliley Act

B.

Computer Fraud and Abuse Act

C.

Computer Security Act

D.

Digital Millennium Copyright Act

Full Access
Question # 32

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

A.

Programming andtraining

B.

Evaluation and acceptance

C.

Initiation

D.

Design

Full Access
Go to page: