ISC Information Systems Security Management Professional CISSP-ISSMP training questions have been released, which are the best material for you to clear CISSP-ISSMP test. The CISSP-ISSMP is ideal for those working in roles such as: Chief information officer, Chief information security officer, Chief technology officer and Senior security executive. To prepare CISSP-ISSMP exam well, the official CISSP-ISSMP exam information, outline and training questions are helpful in the preparation.
CISSP-ISSMP Exam Information
Length of exam: 3 hours
Number of items: 125
Item format: Multiple choice
Passing grade: 700 out of 1000 points
Exam availability: English
Testing center: Pearson VUE Testing Center
Outline of CISSP-ISSMP Exam
1. Leadership and Business Management 22%
2. Systems Lifecycle Management 19%
3. Risk Management 18%
4. Threat Intelligence and Incident Management 17%
5. Contingency Management 10%
6. Law, Ethics, and Security Compliance Management 14%
ISC CISSP-ISSMP Exam Training Questions
CISSP-ISSMP exam training questions can help you test the above outline. Share some ISC Information Systems Security Management Professional CISSP-ISSMP exam training questions below.
1.Sarah has created a site on which she publishes a copyrighted material.
She is ignorant that she is infringing copyright. Is she guilty under copyright laws?
A. No
B. Yes
Answer: B
2.Which of the following models uses a directed graph to specify the rights that a subject can transfer to an object or that a subject can take from another subject?
A. Take-Grant Protection Model
B. Bell-LaPadula Model
C. Biba Integrity Model
D. Access Matrix
Answer: A
3.Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
A. Business continuity plan
B. Crisis communication plan
C. Contingency plan
D. Disaster recovery plan
Answer: A
4.Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.
A. Confidentiality
B. Integrity
C. Availability
D. Privacy
Answer: ABC
5.Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.
A. Shielding
B. Spoofing
C. Eavesdropping
D. Packaging
Answer: C