ISC CISSP-ISSMP ISC Information Systems Security Management Professional Online Training
ISC CISSP-ISSMP Online Training
The questions for CISSP-ISSMP were last updated at Jul 12,2025.
- Exam Code: CISSP-ISSMP
- Exam Name: ISC Information Systems Security Management Professional
- Certification Provider: ISC
- Latest update: Jul 12,2025
Electronic communication technology refers to technology devices, such as computers and cell phones, used to facilitate communication.
Which of the following is/are a type of electronic communication? Each correct answer represents a complete solution. Choose all that apply.
- A . Internet telephony
- B . Instant messaging
- C . Electronic mail
- D . Post-it note
- E . Blogs
- F . Internet teleconferencing
You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project.
A teaming agreement is an example of what risk response?
- A . Mitigation
- B . Sharing
- C . Acceptance
- D . Transference
Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?
- A . HIPAA
- B . COPPA
- C . FERPA
- D . GLBA
Which of the following steps is the initial step in developing an information security strategy?
- A . Perform a technical vulnerabilities assessment.
- B . Assess the current levels of security awareness.
- C . Perform a business impact analysis.
- D . Analyze the current business strategy.
Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.
- A . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
- B . It determines the actions and behaviors of a single individual within a system
- C . It ensures that modifications are not made to data by unauthorized personnel or processes.
- D . It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."
- A . Cost Plus Fixed Fee
- B . Cost Plus Percentage of Cost
- C . Cost Plus Incentive Fee
- D . Cost Plus Award Fee
Ned is the program manager for his organization and he’s considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples.
What type of a document should Ned send to the vendor?
- A . IFB
- B . RFQ
- C . RFP
- D . RFI
Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.
- A . IP spoofing
- B . Broadcast storm
- C . Password sniffing
- D . DoS attack
What is a stakeholder analysis chart?
- A . It is a matrix that documents stakeholders’ threats, perceived threats, and communication needs.
- B . It is a matrix that identifies all of the stakeholders and to whom they must report to.
- C . It is a matrix that documents the stakeholders’ requirements, when the requirements were created, and when the fulfillment of the requirements took place.
- D . It is a matrix that identifies who must communicate with whom.
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
- A . Disaster Recovery Plan
- B . Continuity of Operations Plan
- C . Contingency Plan
- D . Business Continuity Plan