Free CISSP-ISSMP Exam Braindumps (page: 21)

Page 20 of 55

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?

  1. Configuration Verification and Auditing
  2. Configuration Item Costing
  3. Configuration Identification
  4. Configuration Status Accounting

Answer(s): B



What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

  1. Maintain and Monitor
  2. Organization Vulnerability
  3. Define Policy
  4. Baseline the Environment

Answer(s): A,C,D



Which of the following is a documentation of guidelines that are used to create archival copies of important data?

  1. User policy
  2. Security policy
  3. Audit policy
  4. Backup policy

Answer(s): D



Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

  1. Outsource
  2. Proposal
  3. Contract
  4. Service level agreement

Answer(s): C






Post your Comments and Discuss ISC CISSP-ISSMP exam with other Community members:

CISSP-ISSMP Discussions & Posts