Free ISSMP Exam Braindumps

Pass your Information Systems Security Management Professional exam with these free Questions and Answers

Page 2 of 44
QUESTION 1

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

  1. A. Code Security law
  2. B. Trademark laws
  3. C. Copyright laws
  4. D. Patent laws

Correct Answer: D

QUESTION 2

Fill in the blank with an appropriate phrase. An is an intensive application of the OPSEC process to an existing operation or activity by a multidiscipline team of experts.

  1. A. OPSEC assessment

Correct Answer: A

QUESTION 3

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

  1. A. IP spoofing
  2. B. Broadcast storm
  3. C. Password sniffing
  4. D. DoS attack

Correct Answer: AC

QUESTION 4

You have created a team of HR Managers and Project Managers for Blue Well Inc. The team will concentrate on hiring some new employees for the company and improving the organization's overall security by turning employees among numerous job positions. Which of the following steps will you perform to accomplish the task?

  1. A. Job rotation
  2. B. Job responsibility
  3. C. Screening candidates
  4. D. Separation of duties

Correct Answer: A

QUESTION 5

What is a stakeholder analysis chart?

  1. A. It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.
  2. B. It is a matrix that identifies all of the stakeholders and to whom they must report to.
  3. C. It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place..
  4. D. It is a matrix that identifies who must communicate with who

Correct Answer: A

Page 2 of 44

Post your Comments and Discuss ISC2 ISSMP exam with other Community members: