ISC2 CISSP-ISSMP Certification Sample Questions

CISSP-ISSMP Dumps, CISSP-ISSMP Dumps, CISSP-ISSMP PDF, CISSP-ISSMP VCE, ISC2 CISSP-ISSMP VCE, ISC2 ISSMP PDFThe purpose of this Sample Question Set is to provide you with information about the ISC2 Information Systems Security Management Professional exam. These sample questions will make you very familiar with both the type and the difficulty level of the questions on the CISSP-ISSMP certification test. To get familiar with real exam environment, we suggest you try our Sample ISC2 CISSP-ISSMP Certification Practice Exam. This sample practice exam gives you the feeling of reality and is a clue to the questions asked in the actual ISC2 Information Systems Security Management Professional (CISSP-ISSMP) certification exam.

These sample questions are simple and basic questions that represent likeness to the real ISC2 CISSP-ISSMP exam questions. To assess your readiness and performance with real time scenario based questions, we suggest you prepare with our Premium ISC2 CISSP-ISSMP Certification Practice Exam. When you solve real time scenario based questions practically, you come across many difficulties that give you an opportunity to improve.

ISC2 CISSP-ISSMP Sample Questions:

01. A court case that involves a prosecutor is known as:
a) A tort
b) A civil action
c) A criminal case
d) A warrant
 
02. Which of the following has the highest level of precedence for an organization?
a) Policy
b) Guidelines
c) Procedures
d) Standards
 
03. The Notification Activation Phase of the BCP/CP/DRP includes:
a) The basis for declaring an emergency
b) Activities to notify recovery personnel
c) The assessment of system damage
d) A sequence of restoration goals
 
04. A document recording the business requirement for an IT service is known as _________.
a) A Service Level Agreement
b) A Service Level Objective
c) A Service Level Requirement
d) An Operational Level Agreement
e) An Underpinning Contract
 
05. Commonly used in system development today, this model applies short iterations of development within release increments to permit stakeholders to help steer the development.
a) Waterfall
b) Spiral
c) RAD
d) Agile
 
06. Security configuration checklists are also known as ________.
a) Security baselines
b) Enterprise security configuration framework
c) Compliance assessments
d) Maximum system security configurations
 
07. Security efforts are integrated into a 5-phase system development lifecycle (SDLC) throughout:
a) Initiation, design, subsystem specification, development, and implementation
b) Design, Development, implementation, and disposal
c) Predevelopment, Development, testing, implementation, and operations
d) Initiation, development, implementation, operations, and disposal
 
08. What level of learning is exemplified when the security manager attends a class on the European Union General Data Protection Regulation (GDPR)?
a) Awareness
b) Training
c) Education
d) Presentation
 
09. An objective approach to risk assessment; producing objective, discrete numeric values of expected losses from the occurrence of a threat within a time period of expectation.
a) Computational
b) Quantitative
c) Calculated
d) Qualitative
 
10. Defense-in-depth is an approach to protecting data that is based on the concept of:
a) Signing a file with a valid digital signature in a production environment
b) Data obfuscation through the use of hidden streams deep in the data flow
c) Achieving greater security through layered defenses
d) Using quantum encryption to minimize the risk of data compromise

Answers:

Question: 01
Answer: c
Question: 02
Answer: a
Question: 03
Answer: b
Question: 04
Answer: c
Question: 05
Answer: d
Question: 06
Answer: a
Question: 07
Answer: d
Question: 08
Answer: c
Question: 09
Answer: b
Question: 10
Answer: c

Note: For any error in ISC2 Information Systems Security Management Professional (CISSP-ISSMP) certification exam sample questions, please update us by writing an email on feedback@edusum.com.

Rating: 4.8 / 5 (122 votes)