Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSMP Exam Dumps - ISSMP®: Information Systems Security Management Professional

Go to page:
Question # 9

Which of the following penetration testing phases involves reconnaissance or data gathering?

A.

Attack phase

B.

Pre-attack phase

C.

Post-attack phase

D.

Out-attack phase

Full Access
Question # 10

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

A.

Spam

B.

Patent

C.

Artistic license

D.

Phishing

Full Access
Question # 11

Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?

A.

18 U.S.C. 1362

B.

18 U.S.C. 1030

C.

18 U.S.C. 1029

D.

18 U.S.C. 2701

E.

18 U.S.C. 2510

Full Access
Question # 12

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

A.

SSAA

B.

FITSAF

C.

FIPS

D.

TCSEC

Full Access
Question # 13

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

A.

It improves the possibility for career advancement of the IT staff.

B.

It improves the security of vendor relations.

C.

It improves the performance of a company's intranet.

D.

It improves awareness of the need to protect system resources.

Full Access
Question # 14

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

A.

Programming and training

B.

Evaluation and acceptance

C.

Definition

D.

Initiation

Full Access
Question # 15

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

A.

Configuration Verification and Auditing

B.

Configuration Item Costing

C.

Configuration Identification

D.

Configuration Status Accounting

Full Access
Question # 16

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.

Packet filtering

B.

Tunneling

C.

Packet sniffing

D.

Spoofing

Full Access
Go to page: