ISC CISSP-ISSMP ISC Information Systems Security Management Professional Online Training
ISC CISSP-ISSMP Online Training
The questions for CISSP-ISSMP were last updated at Sep 11,2025.
- Exam Code: CISSP-ISSMP
- Exam Name: ISC Information Systems Security Management Professional
- Certification Provider: ISC
- Latest update: Sep 11,2025
The goal of Change Management is to ensure that standardized methods and procedures are used for efficient handling of all changes.
Which of the following are Change Management terminologies? Each correct answer represents a part of the solution. Choose three.
- A . Request for Change
- B . Service Request Management
- C . Change
- D . Forward Schedule of Changes
Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?
- A . Initial analysis, request for service, data collection, data reporting, data analysis
- B . Initial analysis, request for service, data collection, data analysis, data reporting
- C . Request for service, initial analysis, data collection, data analysis, data reporting
- D . Request for service, initial analysis, data collection, data reporting, data analysis
Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?
- A . The Service Level Manager
- B . The Configuration Manager
- C . The IT Security Manager
- D . The Change Manager
James works as a security manager for SoftTech Inc. He has been working on the continuous process improvement and on the ordinal scale for measuring the maturity of the organization involved in the software processes.
According to James, which of the following maturity levels of software CMM focuses on the continuous process improvement?
- A . Repeatable level
- B . Defined level
- C . Initiating level
- D . Optimizing level
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
- A . Patent
- B . Utility model
- C . Snooping
- D . Copyright
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location.
However, budget is an issue.
Which of the following is most appropriate for this client?
- A . Cold site
- B . Off site
- C . Hot site
- D . Warm site
Which of the following is a process of monitoring data packets that travel across a network?
- A . Password guessing
- B . Packet sniffing
- C . Shielding
- D . Packet filtering
Mark works as a security manager for SofTech Inc. He is working in a partially equipped office space which contains some of the system hardware, software, telecommunications, and power sources.
In which of the following types of office sites is he working?
- A . Mobile site
- B . Warm site
- C . Cold site
- D . Hot site
You are documenting your organization’s change control procedures for project management.
What portion of the change control process oversees features and functions of the product scope?
- A . Configuration management
- B . Product scope management is outside the concerns of the project.
- C . Scope change control system
- D . Project integration management
Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?
- A . Spam
- B . Patent
- C . Artistic license
- D . Phishing