Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISSMP ISC ISSMP®: Information Systems Security Management Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC ISSMP ISSMP®: Information Systems Security Management Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 218 questions

Which of the following is generally practiced by the police or any other recognized governmental authority?

A.

Phishing

B.

Wiretapping

C.

SMB signing

D.

Spoofing

Which of the following types of cyber stalking damage the reputation of their victim and turn other people against them by setting up their own Websites, blogs or user pages for this purpose?

A.

Encouraging others to harass the victim

B.

False accusations

C.

Attempts to gather information about the victim

D.

False victimization

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

A.

Device Seizure

B.

Ontrack

C.

DriveSpy

D.

Forensic Sorter

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?

A.

Gramm-Leach-Bliley Act

B.

Computer Fraud and Abuse Act

C.

Computer Security Act

D.

Digital Millennium Copyright Act

Which of the following protocols is used with a tunneling protocol to provide security?

A.

FTP

B.

IPX/SPX

C.

IPSec

D.

EAP

You are documenting your organization's change control procedures for project management. What portion of the change control process oversees features and functions of the product scope?

A.

Configuration management

B.

Product scope management is outside the concerns of the project.

C.

Scope changecontrol system

D.

Project integration management

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

A.

Programming andtraining

B.

Evaluation and acceptance

C.

Initiation

D.

Design

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

A.

SLA

B.

NDA

C.

Non-price competition

D.

CNC

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

A.

Risk management plan

B.

Lessons learned documentation

C.

Risk register

D.

Stakeholder management strategy

Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?

A.

Division A

B.

Division D

C.

Division B

D.

Division C

Which of the following security issues does the Bell-La Padula model focus on?

A.

Authentication

B.

Confidentiality

C.

Integrity

D.

Authorization

Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.

A.

Life cycle

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? Each correct answer represents a part of the solution. Choose two.

A.

TLS

B.

HTTP

C.

SNMP

D.

SSL

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

A.

B-rated

B.

C-rated

C.

D-rated

D.

A-rated

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project using configuration management and has completed 70% of it. You need to ensure that the network infrastructure devices and networking standards used in this project are installed in accordance with the requirements of its detailed project design documentation. Which of the following procedures will you employ to accomplish the task?

A.

Configuration identification

B.

Physical configuration audit

C.

Configuration control

D.

Functional configuration audit

Which of the following rate systems of the Orange book has no security controls?

A.

D-rated

B.

C-rated

C.

E-rated

D.

A-rated

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

A.

Social engineering

B.

Smurf

C.

Denial-of-Service

D.

Man-in-the-middle

Which of the following statements best explains how encryption works on the Internet?

A.

Encryption encodes information using specific algorithms with a string of numbers known as a key.

B.

Encryption validates a username and passwordbefore sending information to the Web server.

C.

Encryption allows authorized users to access Web sites that offer online shopping.

D.

Encryption helps in transaction processing by e-commerce servers on the Internet.

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

A.

Monitor and Control Risks

B.

Identify Risks

C.

Perform Qualitative Risk Analysis

D.

Perform Quantitative Risk Analysis

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

A.

Organizational chart reviews

B.

Executive management interviews

C.

Overlaying system technology

D.

Organizational process models

Page: 2 / 4
Total 218 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved