Free CISSP-ISSMP Exam Braindumps (page: 15)

Page 14 of 55

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

  1. Initiation Phase
  2. Development/Acquisition Phase
  3. Implementation Phase
  4. Operation/Maintenance Phase

Answer(s): C



Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

  1. Malicious Communications Act (1998)
  2. Anti-Cyber-Stalking law (1999)
  3. Stalking Amendment Act (1999)
  4. Stalking by Electronic Communications Act (2001)

Answer(s): C



Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?

  1. CSIRT
  2. CERT
  3. FIRST
  4. FedCIRC

Answer(s): C



Which of the following statements is related with the first law of OPSEC?

  1. If you are not protecting it (the critical and sensitive information), the adversary wins!
  2. If you don't know what to protect, how do you know you are protecting it?
  3. If you don't know about your security resources you could not protect your network.
  4. If you don't know the threat, how do you know what to protect?

Answer(s): D






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts