Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ISSMP Exam Dumps - ISC certification Questions and Answers

Question # 24

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

Options:

A.

Mobile Site

B.

Cold Site

C.

Warm Site

D.

Hot Site

Buy Now
Question # 25

Which of the following administrative policy controls is usually associated with government classifications of materials and the clearances of individuals to access those materials?

Options:

A.

Separation of Duties

B.

Due Care

C.

Acceptable Use

D.

Need to Know

Buy Now
Question # 26

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Organizational chart reviews

B.

Executive management interviews

C.

Overlaying system technology

D.

Organizational process models

Buy Now
Question # 27

Which of the following statements best explains how encryption works on the Internet?

Options:

A.

Encryption encodes information using specific algorithms with a string of numbers known as a key.

B.

Encryption validates a username and passwordbefore sending information to the Web server.

C.

Encryption allows authorized users to access Web sites that offer online shopping.

D.

Encryption helps in transaction processing by e-commerce servers on the Internet.

Buy Now
Question # 28

You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:

How much capital should the project set aside for the risk contingency reserve?

Options:

A.

$142,000

B.

$232,000

C.

$41,750

D.

$23,750

Buy Now
Question # 29

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

Options:

A.

Direct

B.

Circumstantial

C.

Incontrovertible

D.

Corroborating

Buy Now
Question # 30

You are the Network Administrator for a software company. Due to the nature of your company's business, you have a significant number of highly computer savvy users. However, you have still decided to limit each user access to only those resources required for their job, rather than give wider access to the technical users (such as tech support and software engineering personnel). What is this an example of?

Options:

A.

The principle of maximum control.

B.

The principle of least privileges.

C.

Proper use of an ACL.

D.

Poor resource management.

Buy Now
Question # 31

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

Options:

A.

Firm Fixed Price

B.

Fixed Price Incentive Fee

C.

Cost Plus Fixed Fee Contract

D.

Fixed Price with Economic Price Adjustment

Buy Now
Question # 32

Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Administrative

B.

Automatic

C.

Physical

D.

Technical

Buy Now
Question # 33

How many change control systems are there in project management?

Options:

A.

3

B.

4

C.

2

D.

1

Buy Now
Exam Code: ISSMP
Exam Name: ISSMPĀ®: Information Systems Security Management Professional
Last Update: Jan 31, 2025
Questions: 218
ISSMP pdf

ISSMP PDF

$25.5  $84.99
ISSMP Engine

ISSMP Testing Engine

$28.5  $94.99
ISSMP PDF + Engine

ISSMP PDF + Testing Engine

$40.5  $134.99