Questions for the ISSMP were updated on : Dec 26 ,2025
Which of the following access control models are used in the commercial sector? Each correct
answer represents a complete solution. Choose two.
B, D
In which of the following mechanisms does an authority, within limitations, specify what objects can
be accessed by a subject?
B
You work as the Senior Project manager in Dotcoiss Inc. Your company has started a software project
using configuration management and has completed 70% of it. You need to ensure that the network
infrastructure devices and networking standards used in this project are installed in accordance with
the requirements of its detailed project design documentation. Which of the following procedures
will you employ to accomplish the task?
B
Which of the following can be done over telephone lines, e-mail, instant messaging, and any other
method of communication considered private.
C
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
A, B, C
Which of the following plans is designed to protect critical business processes from natural or man-
made failures or disasters and the resultant loss of capital due to the unavailability of normal
business processes?
A
Which of the following models uses a directed graph to specify the rights that a subject can transfer
to an object or that a subject can take from another subject?
A
Sarah has created a site on which she publishes a copyrighted material. She is ignorant that she is
infringing copyright. Is she guilty under copyright laws?
B
An organization monitors the hard disks of its employees' computers from time to time. Which policy
does this pertain to?
C
Which of the following is a name, symbol, or slogan with which a product is identified?
B
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
B
In which of the following alternative processing sites is the backup facility maintained in a constant
order, with a full complement of servers, workstations, and communication links ready to assume
the primary operations responsibility?
D
Which of the following are known as the three laws of OPSEC? Each correct answer represents a part
of the solution. Choose three.
A, B, C
Fill in the blank with an appropriate word. _________ are used in information security to formalize
security policies.
A
You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your
company. You have completed the risk analysis processes for the risk events. You and the project
team have created risk responses for most of the identified project risks. Which of the following risk
response planning techniques will you use to shift the impact of a threat to a third party, together
with the responses?
D