CISSP-ISSMP Practice Questions
223 real CISSP-ISSMP exam questions with expert-verified answers and explanations. Page 4 of 5.
- Question #153Security Program Development
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.
Data ClassificationCommercial Data ClassificationInformation ProtectionData Governance - Question #154Security Leadership and Management
Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain...
Intellectual PropertyTrade SecretsLegal FrameworksAsset Protection - Question #155Security Program Development
Which of the following backup sites takes the longest recovery time?
Disaster Recovery SitesCold SiteRecovery Time Objective (RTO)Business Continuity Planning - Question #156Security Leadership and Management
John works as a security manager for Soft Tech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most co...
DRP TestingStructured Walk-throughDisaster Recovery PlanningCost-Effective Security - Question #157Security Operations Management
The incident response team has turned the evidence over to the forensic team. Now, it is the time to begin looking for the ways to improve the incident response process for next ti...
Incident Response ProcessPost-Incident ReviewContinuous ImprovementSecurity Operations Management - Question #158Security Program Development
Which of the following attacks can be mitigated by providing proper training to the employees in an organization?
Social engineeringSecurity awareness trainingEmployee trainingHuman factors in security - Question #159Security Operations Management
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
SNMPNetwork PortsProtocol DefaultsUDP - Question #160Security Program Development
Which of the following is a variant with regard to Configuration Management?
Configuration ManagementConfiguration Item (CI)VariantIT Asset Management - Question #161Security Operations Management
You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that ap...
Digital ForensicsEvidence HandlingChain of CustodyLegal Admissibility - Question #162Security Operations Management
Which of the following are the responsibilities of a custodian with regard to data in an information classification program? Each correct answer represents a complete solution. Cho...
Data CustodianInformation ClassificationData BackupAccess Control - Question #163Foundational Security Concepts
Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.
HTTPSNetwork ProtocolsTCP PortsWeb Security - Question #164Security Leadership and Management
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?
Cybercrime LawsUS LawsComputer Fraud and Abuse Act (CFAA)Legal and Regulatory Compliance - Question #165Security Operations Management
Which of the following statements are true about a hot site? Each correct answer represents a complete solution. Choose all that apply.
Hot SitesDisaster Recovery PlanningBusiness Continuity PlanningRecovery Sites - Question #166Security Program Development
NIST Special Publication 800-50 is a security awareness program. It is designed for those people who are currently working in the information technology field and want information...
NIST SP 800-50Security Awareness ProgramProgram Development LifecycleSecurity Training - Question #167Security Leadership and Management
You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular co...
Contract typesProcurement riskBuyer risk - Question #168Security Operations Management
You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer la...
Physical SecurityAsset ProtectionCost-Benefit AnalysisRisk Mitigation - Question #169Foundational Security Concepts
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptiti...
ConfidentialityShoulder SurfingSocial EngineeringCIA Triad - Question #170Security Program Development
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
Business RecoveryDisaster Recovery PlanningBusiness Continuity PlanningOperational Resilience - Question #171Security Leadership and Management
In which of the following contract types, the seller is reimbursed for all allowable costs for performing the contract work and receives a fixed fee payment which is calculated as...
Contract typesProcurementCost Plus Fixed FeeProject management - Question #172Security Leadership and Management
Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for th...
CyberstalkingReputation DamageOnline HarassmentFalse Accusations - Question #173Security Leadership and Management
Which of the following processes is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?
Change ManagementOrganizational ChangeTransition Planning - Question #174Security Leadership and Management
Mark is the project manager of the NHQ project in Spartech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the S...
Quantitative Risk AnalysisSingle Loss ExpectancyRisk CalculationExposure Factor - Question #175Foundational Security Concepts
Which of the following is the default port for Secure Shell (SSH)?
SSHNetworkingDefault PortsProtocols - Question #176Security Leadership and Management
Drop the appropriate value to complete the formula. Answer:
Quantitative AnalysisSecurity MetricsRisk ManagementDecision Making - Question #177Security Operations Management
Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?
Digital ForensicsEvidence AcquisitionData BackupForensic Tools - Question #178Security Operations Management
You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for se...
Disaster RecoveryRecovery StrategiesBusiness Continuity PlanningAlternate Site Recovery - Question #179Security Leadership and Management
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
Business Continuity Planning (BCP)Disaster Recovery (DR) TeamsEmergency ManagementCrisis Communication - Question #180Security Audit Management
Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?
Risk AuditRisk ManagementAudit DefinitionSecurity Auditing - Question #181Security Operations Management
Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.
Computer ForensicsForensic ProcessEvidence HandlingIncident Response - Question #182Security Program Development
Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.
Social EngineeringSecurity ControlsRisk ManagementSecurity Program - Question #183Security Leadership and Management
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. Which of the following ideas will you consider the best when c...
Security AwarenessSecurity TrainingCommunication StrategyProgram Management - Question #184Security Leadership and Management
Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?
(ISC)2 Code of EthicsProfessional EthicsEthical CanonsProfessional Conduct - Question #185Foundational Security Concepts
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
Orange BookTCSECTrusted Computing BaseMandatory Access Control - Question #186Security Program Development
Which of the following SDLC phases consists of the given security controls. Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requireme...
Secure SDLCSecurity DesignThreat ModelingMisuse Case Modeling - Question #187Security Leadership and Management
Which of the following liabilities is a third-party liability in which an individual may be responsible for an action by another party?
Vicarious LiabilityLegal ConceptsOrganizational LiabilityThird-Party Responsibility - Question #188Security Leadership and Management
Which of the following measurements of an enterprise's security state is the process whereby an organization establishes the parameters within which programs, investments, and acqu...
Performance MeasurementSecurity MetricsProgram Effectiveness - Question #189Security Leadership and Management
You are the Network Administrator for a software company. Due to the nature of your company's business, you have a significant number of highly computer savvy users. However, you h...
Least PrivilegeAccess ControlSecurity PrinciplesUser Access Management - Question #190Security Leadership and Management
Which of the following are examples of administrative controls that involve all levels of employees within an organization and determine which users have access to what resources a...
Administrative ControlsAccess ControlSecurity Awareness TrainingBusiness Continuity Planning - Question #191Security Program Development
Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information as...
Certification and AccreditationInformation AssuranceSecurity Frameworks - Question #192Security Leadership and Management
Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?
Security GovernanceOrganizational RolesSenior Management ResponsibilitySecurity Controls - Question #193Foundational Security Concepts
Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?
TCSECMandatory Access ControlSecurity ModelsAccess Control - Question #194Security Program Development
Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?
Business ContinuityDisaster RecoveryRecovery SitesDuplicate Processing Facility - Question #195Security Program Development
Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will...
Contingency PlanningBusiness ContinuityDisaster RecoverySecurity Programs - Question #196Security Leadership and Management
Tomas is the project manager of the QWS Project and is worried that the project stakeholders will want to change the project scope frequently. His fear is based on the many open is...
Project ManagementChange ManagementScope ControlProject Documentation - Question #197Foundational Security Concepts
Which of the following laws is defined as the Law of Nations or the legal norms that has developed through the customary exchanges between states over time, whether based on diplom...
International LawCustomary LawLegal FrameworksLaw of Nations - Question #198Foundational Security Concepts
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Data IntegrityCIA TriadInformation Security Principles - Question #199Security Leadership and Management
Which of the following anti-child pornography organizations helps local communities to create programs and develop strategies to investigate child exploitation?
Child ExploitationCybercrime InvestigationLaw Enforcement ProgramsCommunity Engagement - Question #200Security Leadership and Management
You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your company. You have completed the risk analysis processes for the risk events. You and the...
Risk ManagementRisk Response PlanningRisk TransferenceProject Management - Question #202Foundational Security Concepts
Which of the following are known as the three laws of OPSEC? Each correct answer represents a part of the solution. Choose three.
OPSECOperational SecuritySecurity PrinciplesThreat Identification - Question #203Security Program Development
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication lin...
Business ContinuityDisaster RecoveryAlternative Processing SitesHot Site