Download Information Systems Security Management Professional.CISSP-ISSMP.ExamTopics.2026-04-20.72q.tqb

Vendor: ISC
Exam Code: CISSP-ISSMP
Exam Name: Information Systems Security Management Professional
Date: Apr 20, 2026
File Size: 253 KB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
  1. Disaster recovery plan
  2. Business continuity plan
  3. Continuity of operation plan
  4. Business recovery plan
Correct answer: D
Question 2
Which of the following rate systems of the Orange book has no security controls?
  1. D-rated
  2. C-rated
  3. E-rated
  4. A-rated
Correct answer: A
Question 3
Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.
  1. Biba-Wilson
  2. Clark-Wilson
  3. Bell-LaPadula
  4. Biba
Correct answer: B, D
Question 4
Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution.
Choose all that apply.
  1. Editor
  2. Custodian
  3. Owner
  4. Security auditor
  5. User
Correct answer: B, C, D, E
Question 5
Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?
  1. NSA-IAM
  2. DITSCAP
  3. ASSET
  4. NIACAP
Correct answer: D
Question 6
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
  1. Electronic Communications Privacy Act of 1986
  2. Wiretap Act
  3. Computer Fraud and Abuse Act
  4. Economic Espionage Act of 1996
Correct answer: A
Question 7
What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?
  1. ZOPA
  2. PON
  3. Bias
  4. BATNA
Correct answer: D
Question 8
Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart?
  1. Quantitative analysis
  2. Contingency reserve
  3. Risk response
  4. Risk response plan
Correct answer: B
Question 9
Which of the following laws enacted in United States makes it illegal for an Internet Service Provider (ISP) to allow child pornography to exist on Web sites?
  1. Child Pornography Prevention Act (CPPA)
  2. USA PATRIOT Act
  3. Prosecutorial Remedies and Tools Against the Exploitation of Children Today Act (PROTECT Act)
  4. Sexual Predators Act
Correct answer: D
Question 10
Which of the following security issues does the Bell-La Padula model focus on?
  1. Authentication
  2. Confidentiality
  3. Integrity
  4. Authorization
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!