Free ISSMP Exam Braindumps (page: 3)

Page 2 of 56

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

  1. Data diddling
  2. Wiretapping
  3. Eavesdropping
  4. Spoofing

Answer(s): A



Which of the following penetration testing phases involves reconnaissance or data gathering?

  1. Attack phase
  2. Pre-attack phase
  3. Post-attack phase
  4. Out-attack phase

Answer(s): B



Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational.
Which of the following are the objectives related to the above phase in which Mark is involved? Each correct answer represents a part of the solution. Choose three.

  1. Resource requirements identification
  2. Criticality prioritization
  3. Down-time estimation
  4. Performing vulnerability assessment

Answer(s): A,B,C



Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

  1. Business continuity plan
  2. Disaster recovery plan
  3. Continuity of Operations Plan
  4. Contingency plan

Answer(s): D






Post your Comments and Discuss ISC2 ISSMP exam with other Community members:

ISSMP Discussions & Posts