CISSP-ISSMP Quiz Questions and Answers

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

Answer :
  • Integrity

Which of the following is a name, symbol, or slogan with which a product is identified?

Answer :
  • Trademark

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Answer :
  • Cost plus percentage of costs

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

Answer :
  • Patent

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

Answer :
  • Evaluation and acceptance

Which of the following are known as the three laws of OPSEC?

Answer :
  • If you don't know the threat, how do you know what to protect?
  • If you don't know what to protect, how do you know you are protecting it?
  • If you are not protecting it (the critical and sensitive information), the adversary wins!

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Answer :
  • Patent laws

Which of the following is the default port for Simple Network Management Protocol (SNMP)?

Answer :
  • UDP port 161

Which of the following deals is a binding agreement between two or more persons that is enforceable by law?

Answer :
  • Contract

What are the steps related to the vulnerability management program? (Choose three.)

Answer :
  • Maintain and Monitor
  • Define Policy
  • Baseline the Environment