Free ISSMP Exam Braindumps

Pass your Information Systems Security Management Professional exam with these free Questions and Answers

Page 8 of 44
QUESTION 31

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

  1. A. Availability
  2. B. Confidentiality
  3. C. Integrity
  4. D. Authenticity

Correct Answer: B

QUESTION 32

Which of the following statements about the availability concept of Information security management is true?

  1. A. It determines actions and behaviors of a single individual within a system.
  2. B. It ensures reliable and timely access to resources.
  3. C. It ensures that unauthorized modifications are not made to data byauthorized personnel or processes.
  4. D. It ensures that modifications are not made to data by unauthorized personnel or processe

Correct Answer: B

QUESTION 33

Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

  1. A. Names of the victims
  2. B. Location of each incident
  3. C. Nature of harassment
  4. D. Date and time of incident

Correct Answer: ABD

QUESTION 34

What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.

  1. A. Troubleshooting
  2. B. Investigation
  3. C. Upgradation
  4. D. Backup

Correct Answer: AB

QUESTION 35

Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?

  1. A. Evidence access policy
  2. B. Incident responsepolicy
  3. C. Chain of custody
  4. D. Chain of evidence

Correct Answer: C

Page 8 of 44

Post your Comments and Discuss ISC2 ISSMP exam with other Community members: