Download ISC.CISSP-ISSMP.TestKing.2018-11-27.132q.vcex

Download Exam

File Info

Exam Information Systems Security Management Professional
Number CISSP-ISSMP
File Name ISC.CISSP-ISSMP.TestKing.2018-11-27.132q.vcex
Size 110 KB
Posted Nov 27, 2018
Download ISC.CISSP-ISSMP.TestKing.2018-11-27.132q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following is the best method to stop vulnerability attacks on a Web server?  


  1. Using strong passwords
  2. Configuring a firewall
  3. Implementing the latest virus scanner
  4. Installing service packs and updates
Correct answer: D



Question 2

Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?


  1. Managed level
  2. Defined level
  3. Fundamental level
  4. Repeatable level
Correct answer: C



Question 3

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?


  1. Emergency-management team
  2. Damage-assessment team
  3. Off-site storage team
  4. Emergency action team
Correct answer: D



Question 4

Which of the following security models dictates that subjects can only access objects through applications?


  1. Biba-Clark model
  2. Bell-LaPadula
  3. Clark-Wilson
  4. Biba model
Correct answer: C



Question 5

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.


  1. Data downloading from the Internet
  2. File and object access
  3. Network logons and logoffs
  4. Printer access
Correct answer: BCD



Question 6

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. 
What type of security audit do you need to conduct to resolve the problem?


  1. Operational audit
  2. Dependent audit
  3. Non-operational audit
  4. Independent audit
Correct answer: D



Question 7

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?


  1. Gramm-Leach-Bliley Act
  2. Computer Fraud and Abuse Act
  3. Computer Security Act
  4. Digital Millennium Copyright Act
Correct answer: B



Question 8

Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.


  1. Life cycle
Correct answer: 1



Question 9

You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:
  
How much capital should the project set aside for the risk contingency reserve?  


  1. $142,000
  2. $232,000
  3. $41,750
  4. $23,750
Correct answer: D
Explanation:



Question 10

Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.


  1. It can be achieved by installing service packs and security updates on a regular basis.
  2. It is used for securing the computer hardware.
  3. It can be achieved by locking the computer room.
  4. It is used for securing an operating system.
Correct answer: AD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files