Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Information Systems Security Management Professional Exam

Certification Provider: ISC2
Exam Name: Information Systems Security Management Professional
Duration: 150 Minutes
Number of questions in our database: 218
Exam Version: Apr. 25, 2024
Exam Official Topics:
  • Topic 1: Threat Intelligence and Incident Management/ Risk Management
  • Topic 2: Law, Ethics and Security Compliance Management/ Understand the general processes employed in the identification of system assets
  • Topic 3: Systems Lifecycle Management/ Contingency Management/ Apply metrics, budgeting, project management and management of security team
  • Topic 4: Leadership and Business Management/ Recommend a documented security program that includes security awareness
  • Topic 5: Recognize the laws, regulations, and supporting policies/ Understand the general processes employed in the identification of system assets
Disscuss ISC2 Information Systems Security Management Professional Topics, Questions or Ask Anything Related

Currently there are no comments in this discussion, be the first to comment!

Free ISC2 Information Systems Security Management Professional Exam Actual Questions

The questions for Information Systems Security Management Professional were last updated On Apr. 25, 2024

Question #1

Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is infringing copyright. Is she guilty under copyright laws?

Reveal Solution Hide Solution
Correct Answer: B

Question #2

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.

Reveal Solution Hide Solution
Correct Answer: A, B, C

Question #3

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other method of communication considered private.

Reveal Solution Hide Solution
Correct Answer: C

Eavesdropping is the process of listening in private conversations. It also includes attackers listening in on the network traffic. For example, it can be done over telephone lines (wiretapping), e-mail, instant messaging, and any other method of communication considered private.

Answer option B is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected.

Answer option A is incorrect. Shielding cannot be done over e-mail and instant messaging. Shielding is a way of preventing electronic emissions that are generated from a computer or network from being used by unauthorized users for gathering confidential information. It minimizes the chances of eavesdropping within a network. Shielding can be provided by surrounding a computer room with a Farady cage. A Farady cage is a device that prevents electromagnetic signal emissions from going outside the computer room. Shielding can also protect wireless networks from denial of service (DoS) attacks.

Answer option D is incorrect. Packaging is a process in which goods are differentiated on the basis of the container in which they are stored, such as bottles, boxes, bags, etc.


Question #4

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?

Reveal Solution Hide Solution
Correct Answer: B

Contingency plan is prepared and documented for emergency response, backup operations, and recovery maintained by an activity as the element of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency

situation. A contingency plan is a plan devised for a specific situation when things could go wrong. Contingency plans are often devised by governments or businesses who want to be prepared for anything that could happen. Contingency plans include specific strategies and actions to deal with specific variances to assumptions resulting in a particular problem, emergency, or state of affairs. They also include a monitoring process and 'triggers' for initiating planned actions. They are required to help governments, businesses, or individuals to recover from serious incidents in the minimum time with minimum cost and disruption.

Answer option A is incorrect. A disaster recovery plan should contain data, hardware, and software that can be critical for a business. It should also include the plan for sudden loss such as hard disc crash. The business should use backup and data recovery utilities to limit the loss of data.

Answer option C is incorrect. The Continuity Of Operation Plan (COOP) refers to the preparations and institutions maintained by the United States government, providing survival of federal government operations in the case of catastrophic events. It provides procedures and capabilities to sustain an organization's essential. COOP is the procedure documented to ensure persistent critical operations throughout any period where normal operations are unattainable.

Answer option D is incorrect. Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster

or extended disruption. The logistical plan is called a business continuity plan.


Question #5

Fill in the blank with an appropriate word. _________ are used in information security to formalize security policies.

Reveal Solution Hide Solution
Correct Answer: A


Unlock all Information Systems Security Management Professional Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77