Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CISSP-ISSMP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSMP Exam Dumps - ISSMP: Information Systems Security Management Professional

Go to page:
Question # 4

Which of the following statements reflect the 'Code of Ethics Preamble' in the '(ISC)2 Code of Ethics'? Each correct answer represents a complete solution. Choose all that apply.

A.

Strict adherence to this Code is a condition of certification.

B.

Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.

C.

Advance and protect the profession.

D.

Provide diligent and competent service to principals.

Full Access
Question # 5

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

A.

18 U.S.C. 1362

B.

18 U.S.C. 1030

C.

18 U.S.C. 1029

D.

18 U.S.C. 2701

E.

18 U.S.C. 2510

Full Access
Question # 6

Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes. Who decides the category of a change?

A.

The Problem Manager

B.

The Process Manager

C.

The Change Manager

D.

The Service Desk

E.

The Change Advisory Board

Full Access
Question # 7

Which of the following rate systems of the Orange book has no security controls?

A.

D-rated

B.

C-rated

C.

E-rated

D.

A-rated

Full Access
Question # 8

Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational. Which of the following are the objectives related to the above phase in which Mark is involved? Each correct answer represents a part of the solution. Choose three.

A.

Resource requirements identification

B.

Criticality prioritization

C.

Down-time estimation

D.

Performing vulnerability assessment

Full Access
Go to page: