Free CISSP-ISSMP Exam Braindumps (page: 24)

Page 23 of 55

Which of the following processes will you involve performing the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?

  1. Penetration testing
  2. Risk analysis
  3. Baselining
  4. Compliance checking

Answer(s): A



Which of the following are the levels of military data classification system? Each correct answer represents a complete solution. Choose all that apply.

  1. Sensitive
  2. Top Secret
  3. Confidential
  4. Secret
  5. Unclassified
  6. Public

Answer(s): A,B,C,D,E



Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

  1. Device Seizure
  2. Ontrack
  3. DriveSpy
  4. Forensic Sorter

Answer(s): C



Which of the following needs to be documented to preserve evidences for presentation in court?

  1. Separation of duties
  2. Account lockout policy
  3. Incident response policy
  4. Chain of custody

Answer(s): D






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts