Free ISSMP Exam Braindumps

Pass your Information Systems Security Management Professional exam with these free Questions and Answers

Page 5 of 44
QUESTION 16

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

  1. A. Configuration management
  2. B. Risk management
  3. C. Procurement management
  4. D. Change management

Correct Answer: A

QUESTION 17

Which of the following measurements of an enterprise's security state is the process whereby an organization establishes the parameters within which programs, investments, and acquisitions reach the desired results?

  1. A. Information sharing
  2. B. Ethics
  3. C. Performance measurement
  4. D. Risk management

Correct Answer: C

QUESTION 18

Management has asked you to perform a risk audit and report back on the results. Bonny, a project team member asks you what a risk audit is. What do you tell Bonny?

  1. A. A risk audit is a review of all the risks that have yet to occur and what their probability of happening are.
  2. B. A risk audit is a review of the effectiveness of the risk responses in dealing with identified risks and their root causes, as well as the effectiveness of the risk management process.
  3. C. A risk audit is a review of all the risk probability and impact for the risks, which are still present in the project but which have not yet occurred.
  4. D. A risk audit is an audit of all the risks that have occurred in the project and what their true impact on cost and time has been.

Correct Answer: B

QUESTION 19

Which of the following laws is defined as the Law of Nations or the legal norms that has developed through the customary exchanges between states over time, whether based on diplomacy or aggression?

  1. A. Customary
  2. B. Tort
  3. C. Criminal
  4. D. Administrative

Correct Answer: A

QUESTION 20

Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.

  1. A. It ensures that unauthorized modifications are not made to data by authorized personnel orprocesses.
  2. B. It determines the actions and behaviors of a single individual within a system
  3. C. It ensures that modifications are not made to data by unauthorized personnel or processes.
  4. D. It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.

Correct Answer: ACD

Page 5 of 44

Post your Comments and Discuss ISC2 ISSMP exam with other Community members: