ISC CISSP-ISSMP Exam Questions
CISSP-ISSMP Information Systems Security Management Professional (Page 3 )

Updated On: 17-Feb-2026

Which of the following penetration testing phases involves reconnaissance or data gathering?

  1. Attack phase
  2. Pre-attack phase
  3. Post-attack phase
  4. Out-attack phase

Answer(s): B



Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational. Which of the following are the objectives related to the above phase in which Mark is involved? Each correct answer represents a part of the solution. Choose three.

  1. Resource requirements identification
  2. Criticality prioritization
  3. Down-time estimation
  4. Performing vulnerability assessment

Answer(s): A,B,C



Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

  1. Business continuity plan
  2. Disaster recovery plan
  3. Continuity of Operations Plan
  4. Contingency plan

Answer(s): D



Which of the following protocols is used with a tunneling protocol to provide security?

  1. FTP
  2. IPX/SPX
  3. IPSec
  4. EAP

Answer(s): C



Which of the following subphases are defined in the maintenance phase of the life cycle models?

  1. Change control
  2. Configuration control
  3. Request control
  4. Release control

Answer(s): A,C,D






Post your Comments and Discuss ISC CISSP-ISSMP exam dumps with other Community members:

Join the CISSP-ISSMP Discussion