ISC issmp practice test

Information Systems Security Management Professional Exam

Last exam update: Jun 17 ,2024
Page 1 out of 15. Viewing questions 1-15 out of None

Question 1

Which of the following access control models are used in the commercial sector?
Each correct answer represents a complete solution. Choose two.

A. Clark-Biba model
B. Clark-Wilson model
C. Bell-LaPadula model
D. Biba model

Mark Question:
Answer:

D and B


Explanation: The Biba and Clark-Wilson access control models are used in the commercial sector.
The Biba model is a formal state transition system of computer security policy that describes a set of
access control rules designed to ensure data integrity. Data and subjects are grouped into ordered
levels of integrity. The model is designed so that subjects may not corrupt data in a level ranked
higher than the subject, or be corrupted by data from a lower level than the subject.
The Clark-Wilson security model provides a foundation for specifying and analyzing an integrity
policy for a computing system.
Answer option C is incorrect. The Bell-LaPadula access control model is mainly used in military
systems.
Answer option A is incorrect. There is no such access control model as Clark-Biba.
Reference: "http.//en.wikipedia.org/wiki/Biba"

Discussions
0 / 1000

Question 2

In which of the following mechanisms does an authority, within limitations, specify what objects can
be accessed by a subject?

A. Role-Based Access Control
B. Discretionary Access Control
C. Task-based Access Control
D. Mandatory Access Control

Mark Question:
Answer:

B


Explanation:
In the discretionary access control, an authority, within limitations, specifies what objects can be
accessed by a subject.
Answer option D is incorrect. In the mandatory access control, a subject's access to an object is
dependent on labels.
Answer option A is incorrect. In the role-based access control, a central authority determines what
individuals can have access to which objects based on the individual's role or title in the
organization.
Answer option C is incorrect. The task-based access control is similar to role-based access control,
but the controls are based on the subject's responsibilities and duties.
Reference: CISM Review Manual 2010, Contents. "Information Security Governance"

Discussions
0 / 1000

Question 3

You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project
using configuration management and has completed 70% of it. You need to ensure that the network
infrastructure devices and networking standards used in this project are installed in accordance with
the requirements of its detailed project design documentation. Which of the following procedures
will you employ to accomplish the task?

A. Configuration identification
B. Physical configuration audit
C. Configuration control
D. Functional configuration audit

Mark Question:
Answer:

B


Explanation:

Physical Configuration Audit (PCA) is one of the practices used in Software Configuration
Management for Software Configuration Auditing. The purpose of the software PCA is to ensure that
the design and reference documentation is consistent with the as-built software product. PCA checks
and matches the really implemented layout with the documented layout.
Answer option D is incorrect. Functional Configuration Audit or FCA is one of the practices used in
Software Configuration Management for Software Configuration Auditing. FCA occurs either at
delivery or at the moment of effecting the change. A Functional Configuration Audit ensures that
functional and performance attributes of a configuration item are achieved.
Answer option C is incorrect. Configuration control is a procedure of the Configuration management.
Configuration control is a set of processes and approval stages required to change a configuration
item's attributes and to re-baseline them. It supports the change of the functional and physical
attributes of software at various points in time, and performs systematic control of changes to the
identified attributes.
Answer option A is incorrect. Configuration identification is the process of identifying the attributes
that define every aspect of a configuration item. A configuration item is a product (hardware and/or
software) that has an end-user purpose. These attributes are recorded in configuration
documentation and baselined. Baselining an attribute forces formal configuration change control
processes to be effected in the event that these attributes are changed.

Discussions
0 / 1000

Question 4

Which of the following can be done over telephone lines, e-mail, instant messaging, and any other
method of communication considered private.

A. Shielding
B. Spoofing
C. Eavesdropping
D. Packaging

Mark Question:
Answer:

C


Explanation:

Eavesdropping is the process of listening in private conversations. It also includes attackers listening
in on the network traffic. For example, it can be done over telephone lines (wiretapping), e-mail,
instant messaging, and any other method of communication considered private.
Answer option B is incorrect. Spoofing is a technique that makes a transmission appear to have come
from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a
hacker modifies packet headers by using someone else's IP address to hide his identity. However,
spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source
IP address causes the responses to be misdirected.
Answer option A is incorrect. Shielding cannot be done over e-mail and instant messaging. Shielding
is a way of preventing electronic emissions that are generated from a computer or network from
being used by unauthorized users for gathering confidential information. It minimizes the chances of
eavesdropping within a network. Shielding can be provided by surrounding a computer room with a
Farady cage. A Farady cage is a device that prevents electromagnetic signal emissions from going
outside the computer room. Shielding can also protect wireless networks from denial of service
(DoS) attacks.
Answer option D is incorrect. Packaging is a process in which goods are differentiated on the basis of
the container in which they are stored, such as bottles, boxes, bags, etc.
Reference: "http.//en.wikipedia.org/wiki/Eavesdropping"

Discussions
0 / 1000

Question 5

Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.

A. Confidentiality
B. Integrity
C. Availability
D. Privacy

Mark Question:
Answer:

A, B, and C


Explanation:
The following concepts represent the three fundamental principles of information security.
1.Confidentiality
2.Integrity
3.Availability
Answer option C is incorrect. Privacy, authentication, accountability, authorization and identification
are also concepts related to information security, but they do not represent the fundamental
principles of information security.
Reference: "http.//en.wikipedia.org/wiki/Information_security"

Discussions
0 / 1000

Question 6

Which of the following plans is designed to protect critical business processes from natural or man-
made failures or disasters and the resultant loss of capital due to the unavailability of normal
business processes?

A. Business continuity plan
B. Crisis communication plan
C. Contingency plan
D. Disaster recovery plan

Mark Question:
Answer:

A


Explanation:

The business continuity plan is designed to protect critical business processes from natural or man-
made failures or disasters and the resultant loss of capital due to the unavailability of normal
business processes.
Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan for
how an organization will recover and restore partially or completely interrupted critical (urgent)
functions within a predetermined time after a disaster or extended disruption. The logistical plan is
called a business continuity plan.
Answer option B is incorrect. The crisis communication plan can be broadly defined as the plan for
the exchange of information before, during, or after a crisis event. It is considered as a sub-specialty
of the public relations profession that is designed to protect and defend an individual, company, or
organization facing a public challenge to its reputation.
The aim of crisis communication plan is to assist organizations to achieve continuity of critical
business processes and information flows under crisis, disaster or event driven circumstances.
Answer option C is incorrect. A contingency plan is a plan devised for a specific situation when things
could go wrong. Contingency plans are often devised by governments or businesses who want to be
prepared for anything that could happen. Contingency plans include specific strategies and actions to
deal with specific variances to assumptions resulting in a particular problem, emergency, or state of
affairs. They also include a monitoring process and "triggers" for initiating planned actions. They are
required to help governments, businesses, or individuals to recover from serious incidents in the
minimum time with minimum cost and disruption.
Answer option D is incorrect. A disaster recovery plan should contain data, hardware, and software
that can be critical for a business. It should also include the plan for sudden loss such as hard disc
crash. The business should use backup and data recovery utilities to limit the loss of data.
Reference: CISM Review Manual 2010, Contents. "Incident Management and Response"

Discussions
0 / 1000

Question 7

Which of the following models uses a directed graph to specify the rights that a subject can transfer
to an object or that a subject can take from another subject?

A. Take-Grant Protection Model
B. Bell-LaPadula Model
C. Biba Integrity Model
D. Access Matrix

Mark Question:
Answer:

A


Explanation:

The take-grant protection model is a formal model used in the field of computer security to establish
or disprove the safety of a given computer system that follows specific rules. It shows that for
specific systems the question of safety is decidable in linear time, which is in general undecidable.
The model represents a system as directed graph, where vertices are either subjects or objects. The
edges between them are labeled and the label indicates the rights that the source of the edge has
over the destination. Two rights occur in every instance of the model. take and grant. They play a
special role in the graph rewriting rules describing admissible changes of the graph.
Answer option D is incorrect. The access matrix is a straightforward approach that provides access
rights to subjects for objects.
Answer option B is incorrect. The Bell-LaPadula model deals only with the confidentiality of classified
material. It does not address integrity or availability.

Discussions
0 / 1000

Question 8

Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is
infringing copyright. Is she guilty under copyright laws?

A. No
B. Yes

Mark Question:
Answer:

B


Explanation:
Sarah is guilty under copyright laws because pleading ignorance of copyright infringement is not an
excuse.
What is copyright?

A copyright is a form of intellectual property, which secures to its holder the exclusive right to
produce copies of his or her works of original expression, such as a literary work, movie, musical
work or sound recording, painting, photograph, computer program, or industrial design, for a
defined, yet extendable, period of time. It does not cover ideas or facts. Copyright laws protect
intellectual property from misuse by other individuals.
Reference: "http.//en.wikipedia.org/wiki/Copyright"

Discussions
0 / 1000

Question 9

An organization monitors the hard disks of its employees' computers from time to time. Which policy
does this pertain to?

A. Network security policy
B. Backup policy
C. Privacy policy
D. User password policy

Mark Question:
Answer:

C


Explanation:

Monitoring the computer hard disks or e-mails of employees pertains to the privacy policy of an
organization.
Answer option B is incorrect. The backup policy of a company is related to the backup of its data.
Answer option A is incorrect. The network security policy is related to the security of a company's
network.
Answer option D is incorrect. The user password policy is related to passwords that users provide to
log on to the network.

Discussions
0 / 1000

Question 10

Which of the following is a name, symbol, or slogan with which a product is identified?

A. Copyright
B. Trademark
C. Trade secret
D. Patent

Mark Question:
Answer:

B


Explanation:

A trademark is a name, symbol, or slogan with which a product is identified. Its uniqueness makes
the product noticeable among the same type of products. For example, Pentium and Athlon are
brand names of the CPUs that are manufactured by Intel and AMD, respectively.
The trademark law protects a company's trademark by making it illegal for other companies to use it
without taking prior permission of the trademark owner. A trademark is registered so that others
cannot use identical or similar marks.
Answer option C is incorrect. A trade secret is a formula, practice, process, design, instrument,
pattern, or compilation of information which is not generally known. It helps a business to obtain an
economic advantage over its competitors or customers. In some jurisdictions, such secrets are
referred to as confidential information or classified information.
Answer option A is incorrect. A copyright is a form of intellectual property, which secures to its
holder the exclusive right to produce copies of his or her works of original expression, such as a
literary work, movie, musical work or sound recording, painting, photograph, computer program, or
industrial design, for a defined, yet extendable, period of time. It does not cover ideas or facts.
Copyright laws protect intellectual property from misuse by other individuals.
Answer option D is incorrect. A patent is a set of exclusive rights granted to anyone who invents any
new and useful machine, process, composition of matter, etc. A patent enables the inventor to
legally enforce his right to exclude others from using his invention.
Reference: "http.//en.wikipedia.org/wiki/Trademark"

Discussions
0 / 1000

Question 11

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

A. Packet filtering
B. Tunneling
C. Packet sniffing
D. Spoofing

Mark Question:
Answer:

B


Explanation:

Tunneling is a process used by remote users to make a secure connection to internal resources after
establishing an Internet connection. The tunnel is created between the two ends by encapsulating
the data in a mutually agreed-upon protocol for transmission.
Answer option A is incorrect. Packet filtering is a method that allows or restricts the flow of specific
types of packets to provide security. It analyzes the incoming and outgoing packets and lets them
pass or stops them at a network interface based on the source and destination addresses, ports, or
protocols. Packet filtering provides a way to define precisely which type of IP traffic is allowed to
cross the firewall of an intranet. IP packet filtering is important when users from private intranets
connect to public networks, such as the Internet.
Answer option C is incorrect. Packet sniffing is a process of monitoring data packets that travel across
a network. The software used for packet sniffing is known as sniffers. There are many packet-sniffing
programs that are available on the Internet. Some of these are unauthorized, which can be harmful
for a network's security.
Answer option D is incorrect. Spoofing is a technique that makes a transmission appear to have
come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing,
a hacker modifies packet headers by using someone else's IP address to hide his identity. However,
spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source
IP address causes the responses to be misdirected.

Discussions
0 / 1000

Question 12

In which of the following alternative processing sites is the backup facility maintained in a constant
order, with a full complement of servers, workstations, and communication links ready to assume
the primary operations responsibility?

A. Mobile Site
B. Cold Site
C. Warm Site
D. Hot Site

Mark Question:
Answer:

D


Explanation:

A hot site is a duplicate of the original site of the organization, with full computer systems as well as
near-complete backups of user data. It provides the backup facility, which is maintained in a constant
order, with a full complement of servers, workstations, and communication links ready to assume
the primary operations responsibility.
A hot site is a backup site in case disaster has taken place in a data center. A hot site is located off
site and provides the best protection. It is an exact replica of the current data center. In case a
disaster struck to the data center, administrators just need to take the backup of recent
data in hot site and the data center is back online in a very short time. It is very expensive to create
and maintain the hot site. There are lots of third party companies that provide disaster recovery
solutions by maintaining hot sites at their end.
Answer option B is incorrect. A cold site is a backup site in case disaster has taken place in a data
center. This is the least expensive disaster recovery solution, usually having only a single room with
no equipment. All equipment is brought to the site after the disaster. It can be on site or off site.
Answer option A is incorrect. Mobile sites are self-reliant, portable shells custom-fitted with definite
telecommunications and IT equipment essential to meet system requirements. These are presented
for lease through commercial vendors.
Answer option C is incorrect. A warm site is, quite logically, a compromise between hot and cold
sites. Warm sites will have hardware and connectivity already established, though on a smaller scale
than the original production site or even a hot site. These sites will have backups on hand, but they
may not be complete and may be between several days and a week old. An example would be
backup tapes sent to the warm site by courier.

Discussions
0 / 1000

Question 13

Which of the following are known as the three laws of OPSEC?
Each correct answer represents a part of the solution. Choose three.

A. If you don't know the threat, how do you know what to protect?
B. If you don't know what to protect, how do you know you are protecting it?
C. If you are not protecting it (the critical and sensitive information), the adversary wins!
D. If you don't know about your security resources you cannot protect your network.

Mark Question:
Answer:

A, B, and C


Explanation:
OPSEC is also known as operations security. It has three laws.
The First Law of OPSEC. If you don't know the threat, how do you know what to protect? Although
specific threats may vary from site to site or program to program. Employees must be aware of the
actual and postulated threats. In any given situation, there is likely to be more than one adversary,
although each may be interested in different information.
The Second Law of OPSEC. If you don't know what to protect, how do you know you are protecting
it? The "what" is the critical and sensitive, or target, information that adversaries require to meet
their objectives.
The Third Law of OPSEC. If you are not protecting it (the critical and sensitive information), the
adversary wins! OPSEC vulnerability assessments, (referred to as "OPSEC assessments" - OA's - or
sometimes as Surveys") are conducted to determine whether or not critical information is
vulnerable to exploitation. An OA is a critical analysis of "what we do" and "how we do it" from the
perspective of
an adversary. Internal procedures and information sources are also reviewed to determine whether
there is an inadvertent release of sensitive information.
Answer option D is incorrect. The statement given in the option is not a valid law of OPSEC.

Discussions
0 / 1000

Question 14

Fill in the blank with an appropriate word. _________ are used in information security to formalize
security policies.

Mark Question:
Answer:

Models.


Explanation: Models provide a great help in information security to formalize security policies. These
models can be abstract or intuitive. They provide a framework for the understanding of fundamental
information security architectural concepts.
Reference: CISM Review Manual 2010, Contents. "Information Security Program Development"

Discussions
0 / 1000

Question 15

You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your
company. You have completed the risk analysis processes for the risk events. You and the project
team have created risk responses for most of the identified project risks. Which of the following risk
response planning techniques will you use to shift the impact of a threat to a third party, together
with the responses?

A. Risk mitigation
B. Risk acceptance
C. Risk avoidance
D. Risk transference

Mark Question:
Answer:

D


Explanation:
Risk transference is a risk response planning technique that is used to shift the impact of a threat to a
third party, together with the ownership of the response.
Risk response planning is a method of developing options to decrease the amount of threats and
make the most of opportunities. The risk response should be aligned with the consequence of the
risk and cost-effectiveness. This planning documents the processes for managing risk events. It
addresses the owners and their responsibilities, risk identification, results from qualification and
quantification processes, budgets and times for responses, and contingency plans. The various risk
response planning techniques are as follows.
Risk acceptance. It indicates that the project team has decided not to change the project
management plan to deal with a risk, or is unable to identify any other suitable response strategy.
Risk avoidance. It is a technique for a threat, which creates changes to the project management plan
that are meant to either eliminate the risk or to protect the project objectives from this impact.
Risk mitigation. It is a list of specific actions being taken to deal with specific risks associated with the
threats and seeks to reduce the probability of occurrence or impact of risk below an acceptable
threshold.
Risk transference. It is used to shift the impact of a threat to a third party, together with the
ownership of the response.

Discussions
0 / 1000
To page 2