Which of the following security models dictates that subjects can only access objects through applications?
Answer(s): C
Which of the following relies on a physical characteristic of the user to verify his identity?
Which of the following types of activities can be audited for security? Each correct answer represents a complete solution. Choose three.
Answer(s): B,C,D
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
Answer(s): D
Post your Comments and Discuss ISC2 ISSMP exam with other Community members:
0xHacker Commented on May 05, 2025 Checked out the ISSMP questions some answers are updated. real nice. Japan