December 9, 2020 by admin ISC issmp practice test Welcome to your ISC issmp practice test QUESTION 1 SIMULATIONFill in the blank with an appropriate phrase.________ models address specifications, requirements, and design,verification and validation, and maintenance activities.Correct Answer: Life cycle None QUESTION 2 Which of the following policies helps reduce the potential damage from the actions of one person? A. CSA B. Risk assessment C. Separation of duties D. Internal audit None QUESTION 3 Which of the following response teams aims to foster cooperation and coordination in incident prevention, to promptrapid reaction to incidents, and to promote information sharing among members and the community at large? A. CSIRT B. CERT C. FIRST D. FedCIRC None QUESTION 4 Which of the following issues are addressed by the change control phase in the maintenance phase of the life cyclemodels? Each correct answer represents a complete solution. (Choose Three) A. Performing quality control B. Recreating and analyzing the problem C. Developing the changes and corresponding tests D. Establishing the priorities of requests QUESTION 5 An organization monitors the hard disks of its employees\\’ computers from time to time. Which policy does this pertain to? A. Network security policy B. Backup policy C. Privacy policy D. User password policy None QUESTION 6 Which of the following backup sites takes the longest recovery time? A. Cold site B. Hot site C. Warm site D. Mobile backup site None QUESTION 7 Which of the following is a documentation of guidelines that computer forensics experts use to handle evidence? A. Evidence access policy B. Incident response policy C. Chain of custody D. Chain of evidence None QUESTION 8 Mark works as a security manager for SoftTech Inc. He is performing a security awareness program. To be successfulin performing the awareness program, he should take into account the needs and current levels of training andunderstanding of the employees and audience. There are five key ways, which Mark should keep in mind whileperforming this activity. Current level of computer usage What the audience really wants to learn How receptive theaudience is to the security program How to gain acceptance Who might be a possible ally Which of the followingactivities is performed in this security awareness process? A. Separation of duties B. Stunned owl syndrome C. Audience participation D. Audience segmentation None QUESTION 9 Which of the following laws enacted in the United States makes it illegal for an Internet Service Provider (ISP) to allow child pornography to exist on Web sites? A. Child Pornography Prevention Act (CPPA) B. USA PATRIOT Act C. Prosecutorial Remedies and Tools Against the Exploitation of Children Today Act (PROTECT Act) D. Sexual Predators Act None QUESTION 10 SIMULATIONFill in the blank with an appropriate phrase.______________ is used to provide security mechanisms for the storage,processing, and transfer of data.Correct Answer: Data classification None QUESTION 11 Which of the following terms describes a repudiation of a contract that occurs before the time when performance is due? A. Expected breach B. Actual breach C. Anticipatory breach D. Nonperforming breach None QUESTION 12 You are the project manager of the NGQQ Project for your company. To help you communicate project status to yourstakeholders, you are going to create a stakeholder register. All of the following information should be included in thestakeholder register except for which one? A. Identification information for each stakeholder B. Assessment information of the stakeholders\\’ major requirements, expectations, and potential influence C. Stakeholder classification of their role in the project D. Stakeholder management strategy None QUESTION 13 Which of the following plans provides procedures for recovering business operations immediately following a disaster? A. Disaster recovery plan B. Business continuity plan C. Continuity of operation plan D. Business recovery plan None Time's up