ISC CISSP-ISSMP Exam Questions
CISSP-ISSMP Information Systems Security Management Professional (Page 4 )

Updated On: 17-Feb-2026

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

  1. Non-repudiation
  2. Confidentiality
  3. Authentication
  4. Integrity

Answer(s): A



Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.

  1. It performs vulnerability/threat analysis assessment.
  2. It identifies and generates IA requirements.
  3. It provides data needed to accurately assess IA readiness.
  4. It provides for entry and storage of individual system data.

Answer(s): A,B,C



Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

  1. Code Security law
  2. Trademark laws
  3. Copyright laws
  4. Patent laws

Answer(s): D



Which of the following is the best method to stop vulnerability attacks on a Web server?

  1. Using strong passwords
  2. Configuring a firewall
  3. Implementing the latest virus scanner
  4. Installing service packs and updates

Answer(s): D



Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?

  1. Managed level
  2. Defined level
  3. Fundamental level
  4. Repeatable level

Answer(s): C






Post your Comments and Discuss ISC CISSP-ISSMP exam dumps with other Community members:

Join the CISSP-ISSMP Discussion