we provide Exact ISC2 CISSP-ISSMP test which are the best for clearing CISSP-ISSMP test, and to get certified by ISC2 Information Systems Security Management Professional. The CISSP-ISSMP Questions & Answers covers all the knowledge points of the real CISSP-ISSMP exam. Crack your ISC2 CISSP-ISSMP Exam with latest dumps, guaranteed!

Q41. James works as a security manager for SoftTech Inc. He has been working on the continuous process improvement and on the ordinal scale for measuring the maturity of the organization involved in the software processes. According to James, which of the following maturity levels of software CMM focuses on the continuous process improvement?

A. Repeatable level

B. Defined level

C. Initiating level

D. Optimizing level

Answer:


Q42. Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A. Disaster Recovery Plan

B. Continuity of Operations Plan

C. Contingency Plan

D. Business Continuity Plan 

Answer: D


Q43. Which of the following subphases are defined in the maintenance phase of the life cycle models?

A. Change control

B. Configuration control

C. Request control

D. Release control 

Answer: A,C,D 


Q44. Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?

A. Managed level

B. Defined level

C. Fundamental level

D. Repeatable level 

Answer:


Q45. What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

A. Scope Verification

B. Project Management Information System

C. Integrated Change Control

D. Configuration Management System 

Answer: D


Q46. Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

A. Outsource

B. Proposal

C. Contract

D. Service level agreement 

Answer: C


Q47. Which of the following types of activities can be audited for security? Each correct answer represents a

complete solution. Choose three.

A. Data downloading from the Internet

B. File and object access

C. Network logons and logoffs

D. Printer access 

Answer: B,C,D 


Q48. Which of the following is a documentation of guidelines that are used to create archival copies of important data?

A. User policy

B. Security policy

C. Audit policy

D. Backup policy 

Answer: