Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISSMP ISC ISSMP®: Information Systems Security Management Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC ISSMP ISSMP®: Information Systems Security Management Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 4
Total 218 questions

Which of the following are the responsibilities of a custodian with regard to data in an information classification program? Each correct answer represents a complete solution. Choose three.

A.

Determining what level of classification the information requires

B.

Running regular backups and routinely testing the validity of the backup data

C.

Controlling access, adding and removing privileges for individual users

D.

Performing data restoration from the backups when necessary

A contract cannot have provisions for which one of the following?

A.

Subcontracting the work

B.

Penalties and fines for disclosure of intellectual rights

C.

A deadline for the completion of the work

D.

Illegal activities

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?

A.

Mobile Site

B.

Cold Site

C.

Warm Site

D.

Hot Site

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

A.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)

B.

Asset Value X Exposure Factor (EF)

C.

Exposure Factor (EF)/Single Loss Expectancy (SLE)

D.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.

A.

Acquire

B.

Analyze

C.

Authenticate

D.

Encrypt

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

A.

TCP port 80

B.

TCP port 25

C.

UDP port 161

D.

TCP port 110

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?

A.

Availability

B.

Encryption

C.

Integrity

D.

Confidentiality

Which of the following are the levels of military data classification system? Each correct answer represents a complete solution. Choose all that apply.

A.

Sensitive

B.

Top Secret

C.

Confidential

D.

Secret

E.

Unclassified

F.

Public

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

A.

Cost

B.

Resources

C.

Contract

D.

Schedule

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Non-repudiation

B.

Confidentiality

C.

Authentication

D.

Integrity

Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?

A.

Take-Grant Protection Model

B.

Bell-LaPadula Model

C.

Biba Integrity Model

D.

Access Matrix

Which of the following is the default port for Secure Shell (SSH)?

A.

UDP port 161

B.

TCP port 22

C.

UDP port 138

D.

TCP port 443

Which of the following is a process of monitoring data packets that travel across a network?

A.

Password guessing

B.

Packet sniffing

C.

Shielding

D.

Packet filtering

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

A.

Legalrepresentative

B.

Technical representative

C.

Lead investigator

D.

Information security representative

Mark is the project manager of the NHQ project in Spartech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

A.

$92,600

B.

$67,250

C.

$68,250

D.

$72,650

Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

A.

Penetration testing

B.

Risk analysis

C.

Baselining

D.

Compliance checking

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A.

Business continuity plan

B.

Disaster recovery plan

C.

Continuity of Operations Plan

D.

Contingency plan

Which of the following security models focuses on data confidentiality and controlled access to classified information?

A.

Bell-La Padula model

B.

Take-Grant model

C.

Clark-Wilson model

D.

Biba model

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

A.

Network security policy

B.

Backup policy

C.

Privacy policy

D.

User password policy

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

A.

Evidence access policy

B.

Incident responsepolicy

C.

Chain of custody

D.

Chain of evidence

Page: 3 / 4
Total 218 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved