Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Note: This exam is available on Demand only. You can Pre-Order this Exam and we will arrange this for you.

Pre-Order Your "ISSMP - Information Systems Security Management Professional" Exam

You can pre-order your "Information Systems Security Management Professional" exam to us if you are in need this urgent. Dumpsmate.com Team will prepare your Exam Questions & Answers From Real Exam within next 2 to 3 Weeks Time only.

How to Make Pre-Order You Exams:

  1. 1. Click to "Add to Cart" Button.
  2. 2. Our Expert will arrange real Exam Questions within 2 to 3 weeks especially for you.
  3. 3. You will be notified within 2 to 3 Weeks' time once your Exam is ready with all Real Questions and Possible Answers with PDF + Testing Engine format.

Why to Choose DumpsMate?

In the unlikely event if we can't make this exam available to you then you will issue a full refund! So there is no risk.

READY TO MAKE YOUR "ISSMP" PRE-ORDER?

$850

 Add To Cart

Question # 4

Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?

A.

Cold sites

B.

Orange sites

C.

Warm sites

D.

Duplicate processing facilities

Full Access
Question # 5

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

A.

Device Seizure

B.

Ontrack

C.

DriveSpy

D.

Forensic Sorter

Full Access
Question # 6

In which of the following contract types, the seller is reimbursed for all allowable costs for performing the contract work and receives a fixed fee payment which is calculated as a percentage of the initial estimated project costs?

A.

Firm Fixed Price Contracts

B.

Cost Plus Fixed Fee Contracts

C.

Fixed Price Incentive Fee Contracts

D.

Cost Plus Incentive Fee Contracts

Full Access
Question # 7

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

Phishing

B.

Wiretapping

C.

SMB signing

D.

Spoofing

Full Access
Question # 8

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A.

Code Security law

B.

Trademark laws

C.

Copyright laws

D.

Patent laws

Full Access
Question # 9

Fill in the blank with the appropriate phrase. ____________ is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.

A.

Configuration status accounting

Full Access
Question # 10

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

A.

Penetration testing

B.

Risk analysis

C.

Baselining

D.

Compliance checking

Full Access
Question # 11

Fill in the blank with an appropriate phrase. _______is a branch of forensic science pertaining to legal evidence found in computers and digital storage media.

A.

Computer forensics

Full Access
Question # 12

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

A.

Outsource

B.

Proposal

C.

Contract

D.

Service level agreement

Full Access
Question # 13

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

A.

TLS

B.

PGP

C.

S/MIME

D.

IPSec

Full Access
Question # 14

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

A.

Mitigation

B.

Sharing

C.

Acceptance

D.

Transference

Full Access
Question # 15

Which of the following rate systems of the Orange book has no security controls?

A.

D-rated

B.

C-rated

C.

E-rated

D.

A-rated

Full Access
Question # 16

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A.

Cold site

B.

Off site

C.

Hot site

D.

Warm site

Full Access
Question # 17

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

A.

PROTECT Act

B.

Sexual Predators Act

C.

Civil Rights Act of 1991

D.

The USA Patriot Act of 2001

Full Access
Question # 18

Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.

A.

It can be achieved by installing service packs and security updates on a regular basis.

B.

It is used for securing the computer hardware.

C.

It can be achieved by locking the computer room.

D.

It is used for securing an operating system.

Full Access
Question # 19

You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability? Each correct answer represents a part of the solution. Choose three.

A.

Recover to an alternate site for critical functions

B.

Restore full system at an alternate operating site

C.

Restore full system after a catastrophic loss

D.

Recover at the primary operating site

Full Access
Question # 20

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

A.

Monitor and Control Risks

B.

Identify Risks

C.

Perform Qualitative Risk Analysis

D.

Perform Quantitative Risk Analysis

Full Access
Question # 21

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.

Preparation

B.

Eradication

C.

Identification

D.

Containment

Full Access
Question # 22

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

A.

Initiation Phase

B.

Development/Acquisition Phase

C.

Implementation Phase

D.

Operation/Maintenance Phase

Full Access
Question # 23

Which of the following is a variant with regard to Configuration Management?

A.

A CI thathas the same name as another CI but shares no relationship.

B.

A CI that particularly refers to a hardware specification.

C.

A CI that has the same essential functionality as another CI but a bit different in some small manner.

D.

A CI that particularly refers to a software version.

Full Access
Question # 24

You work as a project manager for SoftTech Inc. A threat with a dollar value of $150,000 is expected to happen in your project and the frequency of threat occurrence per year is 0.001. What will be the annualized loss expectancy in your project?

A.

$180.25

B.

$150

C.

$100

D.

$120

Full Access
Question # 25

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

A.

Disaster Recovery Plan

B.

Contingency Plan

C.

Continuity Of Operations Plan

D.

Business Continuity Plan

Full Access
Question # 26

Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?

A.

Senior Management

B.

Business Unit Manager

C.

Information Security Steering Committee

D.

Chief Information Security Officer

Full Access
Question # 27

Which of the following administrative policy controls is usually associated with government classifications of materials and the clearances of individuals to access those materials?

A.

Separation of Duties

B.

Due Care

C.

Acceptable Use

D.

Need to Know

Full Access
Question # 28

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Full Access
Question # 29

Which of the following is a process of monitoring data packets that travel across a network?

A.

Password guessing

B.

Packet sniffing

C.

Shielding

D.

Packet filtering

Full Access
Question # 30

Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric's organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric's organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

A.

Yes, the ZAS Corporation did not choose to terminate the contract work.

B.

It depends on what the outcome of a lawsuit will determine.

C.

It dependson what the termination clause of the contract stipulates.

D.

No, the ZAS Corporation did not complete all of the work.

Full Access
Question # 31

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

A.

Malicious Communications Act (1998)

B.

Anti-Cyber-Stalking law (1999)

C.

Stalking Amendment Act(1999)

D.

Stalking by Electronic Communications Act (2001)

Full Access
Question # 32

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

A.

Videosurveillance on all areas with computers.

B.

Use laptop locks.

C.

Appoint a security guard.

D.

Smart card access to all areas with computers.

Full Access