CISSP-ISSMP Quiz Questions and Answers

Which of the following are known as the three laws of OPSEC?

Answer :
  • If you don't know the threat, how do you know what to protect?
  • If you don't know what to protect, how do you know you are protecting it?
  • If you are not protecting it (the critical and sensitive information), the adversary wins!

Explanation :

Dog and Cat are not birds so they don't have wings.

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

Answer :
  • Evaluation and acceptance

Explanation :

This is explanation for the given question

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Answer :
  • Patent

Which of the following needs to be documented to preserve evidences for presentation in court?

Answer :
  • Chain of custody

Which of the following is a name, symbol, or slogan with which a product is identified?

Answer :
  • Trademark

Which of the following signatures watches for the connection attempts to well-known, frequently attacked ports?

Answer :
  • Port signatures

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Answer :
  • Integrity

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. Which of the following ideas will you consider the best when conducting a security awareness campaign?

Answer :
  • Provide customized messages for different groups.