Pass the ISC CISSP Concentrations ISSMP Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

Mark is the project manager of the NHQ project in Spartech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$92,600


B.

$67,250


C.

$68,250


D.

$72,650


Expert Solution
Questions # 22:

You are the project manager of the NGQQ Project for your company. To help you communicate project status to your stakeholders, you are going to create a stakeholder register. All of the following information should be included in the stakeholder register except for which one?

Options:

A.

Identification information for each stakeholder


B.

Assessment information of the stakeholders' major requirements, expectations, and potential influence


C.

Stakeholder classification of their role in the project


D.

Stakeholder management strategy


Expert Solution
Questions # 23:

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

FTP


B.

IPX/SPX


C.

IPSec


D.

EAP


Expert Solution
Questions # 24:

Which of the following types of agreement creates a confidential relationship between the parties to protect any type of confidential and proprietary information or a trade secret?

Options:

A.

SLA


B.

NDA


C.

Non-price competition


D.

CNC


Expert Solution
Questions # 25:

Which of the following statements best describes the consequences of the disaster recovery plan test?

Options:

A.

If no deficiencies were found during the test, then the test was probably flawed.


B.

The plan should not be changed no matter what the results of the test would be.


C.

The results of the test should be kept secret.


D.

If no deficiencies were found during the test, then the plan is probably perfect.


Expert Solution
Questions # 26:

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk mitigation


B.

Risk transfer


C.

Risk acceptance


D.

Risk avoidance


Expert Solution
Questions # 27:

Fill in the blank with the appropriate phrase. ____________ is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.

Options:

A.

Configuration status accounting


Expert Solution
Questions # 28:

Which of the following is the best method to stop vulnerability attacks on a Web server?

Options:

A.

Using strong passwords


B.

Configuring a firewall


C.

Implementing the latest virus scanner


D.

Installing service packs and updates


Expert Solution
Questions # 29:

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses TCP port 80 as the default port.


B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.


C.

It uses TCP port 443 as the default port.


D.

It is a protocol used to provide security for a database server in an internal network.


Expert Solution
Questions # 30:

DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System Definition


B.

Accreditation


C.

Verification


D.

Re-Accreditation


E.

Validation


F.

Identification


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions