Want to know Actualtests CISSP-ISSMP Exam practice test features? Want to lear more about ISC2 Information Systems Security Management Professional certification experience? Study High value ISC2 CISSP-ISSMP answers to Avant-garde CISSP-ISSMP questions at Actualtests. Gat a success with an absolute guarantee to pass ISC2 CISSP-ISSMP (Information Systems Security Management Professional) test on your first attempt.

Q25. What is a stakeholder analysis chart?

A. It is a matrix that documents stakeholders' threats, perceived threats, and communication needs.

B. It is a matrix that identifies all of the stakeholders and to whom they must report to.

C. It is a matrix that documents the stakeholders' requirements, when the requirements were created, and when the fulfillment of the requirements took place..

D. It is a matrix that identifies who must communicate with whom. 

Answer: A


Q26. Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a  part of software?

A. Code Security law

B. Trademark laws

C. Copyright laws

D. Patent laws 

Answer:


Q27. Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

A. Emergency-management team

B. Damage-assessment team

C. Off-site storage team

D. Emergency action team 

Answer: D


Q28. Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?

A. Gramm-Leach-Bliley Act

B. Computer Fraud and Abuse Act

C. Computer Security Act

D. Digital Millennium Copyright Act 

Answer: B


Q29. Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation? Each correct answer represents a complete solution. Choose all that apply.

A. Names of the victims

B. Location of each incident

C. Nature of harassment

D. Date and time of incident 

Answer: A,B,D 


Q30. Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes. Who decides the category of a change?

A. The Problem Manager

B. The Process Manager

C. The Change Manager

D. The Service Desk

E. The Change Advisory Board 

Answer: C


Q31. Which of the following is the correct order of digital investigations Standard Operating Procedure (SOP)?

A. Initial analysis, request for service, data collection, data reporting, data analysis

B. Initial analysis, request for service, data collection, data analysis, data reporting

C. Request for service, initial analysis, data collection, data analysis, data reporting

D. Request for service, initial analysis, data collection, data reporting, data analysis 

Answer: C


Q32. Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

A. Data diddling

B. Wiretapping

C. Eavesdropping

D. Spoofing 

Answer: