Pass the ISC CISSP Concentrations ISSMP Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides object, orient, decide and act strategy.


B.

It provides a live documentation of the project.


C.

It provides the risk analysis of project configurations.


D.

It provides the versions for network devices.


Expert Solution
Questions # 32:

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

Options:

A.

Configuration management


B.

Risk management


C.

Procurement management


D.

Change management


Expert Solution
Questions # 33:

You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.

Options:

A.

Conflict of interest


B.

Bribery


C.

Illegal practice


D.

Irresponsible practice


Expert Solution
Questions # 34:

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

Options:

A.

Programming andtraining


B.

Evaluation and acceptance


C.

Initiation


D.

Design


Expert Solution
Questions # 35:

Which of the following statements about the availability concept of Information security management is true?

Options:

A.

It determines actions and behaviors of a single individual within a system.


B.

It ensures reliable and timely access to resources.


C.

It ensures that unauthorized modifications are not made to data byauthorized personnel or processes.


D.

It ensures that modifications are not made to data by unauthorized personnel or processes.


Expert Solution
Questions # 36:

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

Options:

A.

PROTECT Act


B.

Sexual Predators Act


C.

Civil Rights Act of 1991


D.

The USA Patriot Act of 2001


Expert Solution
Questions # 37:

Which of the following is the default port for Secure Shell (SSH)?

Options:

A.

UDP port 161


B.

TCP port 22


C.

UDP port 138


D.

TCP port 443


Expert Solution
Questions # 38:

Which of the following sections come under the ISO/IEC 27002 standard?

Options:

A.

Financial assessment


B.

Asset management


C.

Security policy


D.

Risk assessment


Expert Solution
Questions # 39:

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

Options:

A.

Disaster Recovery Plan


B.

Contingency Plan


C.

Continuity Of Operations Plan


D.

Business Continuity Plan


Expert Solution
Questions # 40:

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?

Options:

A.

Earned value management


B.

Risk audit


C.

Technical performance measurement


D.

Correctiveaction


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions