1. Home
  2. ISC2
  3. ISSMP CISSP-ISSMP PDF

ISC2 ISSMP PDF Exam Questions:

How to Get Success in ISC2 ISSMP Exam:

  • Avoid deceptive ISSMP PDF Exam Questions.
  • Focus on ISSMP Questions (PDF) based on the latest exam syllabus.
  • Make notes of ISC2 ISSMP PDF for better learning.
  • Prepare from our latest ISC2 ISSMP PDF file and get success in first attempt.
ISSMP PDF
ISC2 ISSMP PDF

Prepare ISC2 ISSMP Exam Within Short Time

Your knowledge and abilities are validated by passing the ISC2 ISSMP exam. Our PDF questions and answers will help you prepare for the ISSMP exam in a short time because it includes questions similar to the real ISC2 exam questions. After downloading the ISSMP ISC2 PDF exam questions, relevant to the actual exam, you can take a print of all questions and prepare them anytime, anywhere.

Realistic Scenario Based ISC2 ISSMP PDF Exam Questions:

Everyone wants to become certified Certified Information Systems Security Professional and improve his/her resume. You should practice with real ISSMP questions. Students can benefit from the ISSMP exam questions which are available in PDF format. The ISSMP exam questions and answers are designed to match the criteria of the actual exam. If you use scenario-based ISC2 ISSMP questions you will have an extra potential to clear the exam on the first attempt.

Q1.

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

Answer: A

See the explanation below.

Configuration management is a field of management that focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life.

Configuration Management System is a subsystem of the overall project management system. It is a collection of formal documented procedures used to identify and document the functional and physical characteristics of a product, result, service, or component of the project.

It also controls any changes to such characteristics, and records and reports each change and its implementation status. It includes the documentation, tracking systems, and defined approval levels necessary for authorizing and controlling changes. Audits are performed as part of configuration management to determine if the requirements have been met.

Answer option C is incorrect. The procurement management plan defines more than just the procurement of team members, if needed. It defines how procurements will be planned and executed, and how the organization and the vendor will fulfill the terms of the contract.

Answer option B is incorrect. Risk Management is used to identify, assess, and control risks. It includes analyzing the value of assets to the business, identifying threats to those assets, and evaluating how vulnerable each asset is to those threats.

Answer option D is incorrect. Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes.


Q2.

Which of the following are the ways of sending secure e-mail messages over the Internet?

Each correct answer represents a complete solution. Choose two.

Answer: B, C

See the explanation below.

Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME) are two ways of sending secure e-mail messages over the Internet. Both use public key cryptography, where users each possess two keys, a public key for encrypting, and a private key for decrypting messages. Because PGP has evolved from a free distribution, it is more popular than S/MIME.

Answer option A is incorrect. Transport Layer Security (TLS) is an application layer protocol that uses a combination of public and symmetric key processing to encrypt data.

Answer option D is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that provides the highest level of VPN security. IPSec can encrypt virtually everything above the networking layer. It is used for VPN connections that use the L2TP protocol. It secures both data and password.

IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP).


Q3.

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?

Answer: D

See the explanation below.

According to the question, incident response team announced that this was a controlled event not an incident. Incident response team performed the identification step to rectify the incident.

Identification is the first post-attack step in Incident handling process. In this phase of the incident handling process, the Incident Handler determines whether the incident exists or not. An incident is described as an event in a system or network that poses threat to the environment. Identification of an incident becomes more difficult with the increase in the complexity of the attack. The Incident Handler should gather all facts and make decisions on the basis of those facts. Incident Handler needs to identify the following characteristics of an attack before it can be properly processeD.


Q4.

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

Answer: D

See the explanation below.

The reciprocal agreements are arrangements between two or more organizations with similar equipment and applications. According to this agreement, organizations provide computer time to each other in the case of an emergency. Theses types of agreements are commonly done between organizations that have unique hardware or software that cannot be maintained at a hot or warm site.

Answer option B is incorrect. A business impact analysis (BIA) is a crisis management and business impact analysis technique that identifies those threats that can impact the business continuity of operations. Such threats can be either natural or man-made. The BIA team should have a clear understanding of the organization, key business processes, and IT resources for assessing the risks associated with continuity. In the BIA team, there should be senior management, IT personnel, and end users to identify all resources that are to be used during normal operations.

Answer option C is incorrect. The duplicate processing facilities work in the same manner as the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities. The duplicate facility holds same equipment, operating systems, and applications and might have regularly synchronized data. The examples of the duplicate processing facilities can be the large organizations that have multiple geographic locations.

Answer option A is incorrect. A cold site is a backup site in case disaster has taken place in a data center. This is the least expensive disaster recovery solution, usually having only a single room with no equipment. All equipment is brought to the site after the disaster. It can be on site or off site.


Q5.

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Answer: A

See the explanation below.

Data diddling involves changing data prior to or during input to a computer in an effort to commit fraud. It also refers to the act of intentionally modifying information, programs, or documentations.

Answer option C is incorrect. Eavesdropping is the process of listening in private conversations. It also includes attackers listening in on the network traffic. For example, it can be done over telephone lines (wiretapping), e-mail, instant messaging, and any other method of communication considered private.

Answer option D is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected.

Answer option B is incorrect. Wiretapping is an act of monitoring telephone and Internet conversations by a third party. It is only legal with prior consent. Legalized wiretapping is generally practiced by the police or any other recognized governmental authority.


Reliable Source Of Preparation For Information Systems Security Management Professional Exam.

We provide Certified Information Systems Security Professional certification questions along with answers to assist students in passing the ISC2 Exam. You can enhance your ISC2 ISSMP preparation with the help of an online practice engine. Try out our ISC2 ISSMP questions because 98% of Examskit users passed the final ISSMP exam in one go.