ISC CISSP-ISSMP ISC Information Systems Security Management Professional Online Training
ISC CISSP-ISSMP Online Training
The questions for CISSP-ISSMP were last updated at Jul 15,2025.
- Exam Code: CISSP-ISSMP
- Exam Name: ISC Information Systems Security Management Professional
- Certification Provider: ISC
- Latest update: Jul 15,2025
You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed.
According to the change management plan what subsystem will need to manage this change request?
- A . Cost
- B . Resources
- C . Contract
- D . Schedule
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
- A . The Configuration Manager
- B . The Supplier Manager
- C . The Service Catalogue Manager
- D . The IT Service Continuity Manager
In which of the following SDLC phases is the system’s security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?
- A . Initiation Phase
- B . Development/Acquisition Phase
- C . Implementation Phase
- D . Operation/Maintenance Phase
Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?
- A . Malicious Communications Act (1998)
- B . Anti-Cyber-Stalking law (1999)
- C . Stalking Amendment Act (1999)
- D . Stalking by Electronic Communications Act (2001)
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
- A . CSIRT
- B . CERT
- C . FIRST
- D . FedCIRC
Which of the following statements is related with the first law of OPSEC?
- A . If you are not protecting it (the critical and sensitive information), the adversary wins!
- B . If you don’t know what to protect, how do you know you are protecting it?
- C . If you don’t know about your security resources you could not protect your network.
- D . If you don’t know the threat, how do you know what to protect?
Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes.
Who decides the category of a change?
- A . The Problem Manager
- B . The Process Manager
- C . The Change Manager
- D . The Service Desk
- E . The Change Advisory Board
Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?
- A . Direct
- B . Circumstantial
- C . Incontrovertible
- D . Corroborating
Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?
- A . PROTECT Act
- B . Sexual Predators Act
- C . Civil Rights Act of 1991
- D . The USA Patriot Act of 2001
Which of the following policies helps reduce the potential damage from the actions of one person?
- A . CSA
- B . Risk assessment
- C . Separation of duties
- D . Internal audit