Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ISC CISSP Concentrations ISSMP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam ISSMP Premium Access

View all detail and faqs for the ISSMP exam


377 Students Passed

88% Average Score

96% Same Questions
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It ensures that unauthorized modifications are not made to data by authorized personnel orprocesses.

B.

It determines the actions and behaviors of a single individual within a system

C.

It ensures that modifications are not made to data by unauthorized personnel or processes.

D.

It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

Questions # 2:

Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?

Options:

A.

Second Code of Ethics Canons

B.

Fourth Code of Ethics Canons

C.

First Code of Ethics Canons

D.

Third Code of Ethics Canons

Questions # 3:

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1.To account for all IT assets 2.To provide precise information support to other ITIL disciplines 3.To provide a solid base only for Incident and Problem Management 4.To verify configuration records and correct any exceptions

Options:

A.

1, 3, and 4 only

B.

2 and 4 only

C.

1, 2, and 4 only

D.

2, 3, and 4 only

Questions # 4:

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

Options:

A.

Cold sites arrangement

B.

Business impact analysis

C.

Duplicate processing facilities

D.

Reciprocal agreements

Questions # 5:

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Organizational chart reviews

B.

Executive management interviews

C.

Overlaying system technology

D.

Organizational process models

Questions # 6:

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

Options:

A.

Scope Verification

B.

Project Management Information System

C.

Integrated Change Control

D.

Configuration Management System

Questions # 7:

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

Options:

A.

Risk management plan

B.

Lessons learned documentation

C.

Risk register

D.

Stakeholder management strategy

Questions # 8:

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides object, orient, decide and act strategy.

B.

It provides a live documentation of the project.

C.

It provides the risk analysis of project configurations.

D.

It provides the versions for network devices.

Questions # 9:

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

Options:

A.

Penetration testing

B.

Risk analysis

C.

Baselining

D.

Compliance checking

Questions # 10:

Which of the following SDLC phases consists of the given security controls. Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation

Options:

A.

Design

B.

Maintenance

C.

Deployment

D.

Requirements Gathering

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.