Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSMP Exam Dumps - ISSMP®: Information Systems Security Management Professional

Go to page:
Question # 25

Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?

A.

Senior Management

B.

Business Unit Manager

C.

Information Security Steering Committee

D.

Chief Information Security Officer

Full Access
Question # 26

You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?

A.

Implement separation of duties.

B.

Implement RBAC.

C.

Implement three way authentication.

D.

Implement least privileges.

Full Access
Question # 27

Which of the following measurements of an enterprise's security state is the process whereby an organization establishes the parameters within which programs, investments, and acquisitions reach the desired results?

A.

Information sharing

B.

Ethics

C.

Performance measurement

D.

Risk management

Full Access
Question # 28

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

A.

NSA-IAM

B.

DITSCAP

C.

ASSET

D.

NIACAP

Full Access
Question # 29

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

A.

HIPAA

B.

COPPA

C.

FERPA

D.

GLBA

Full Access
Question # 30

Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?

A.

UDP port 161

B.

TCP port 443

C.

TCP port 110

D.

UDP port 1701

Full Access
Question # 31

Fill in the blank with an appropriate phrase.________ An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

A.

OPSEC assessment

Full Access
Question # 32

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project contractual relationship with the vendor

B.

Project management plan

C.

Project communications plan

D.

Project scope statement

Full Access
Go to page: