Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CISSP-ISSMP ISC Exam Lab Questions

Page: 2 / 8
Total 218 questions

ISSMPĀ®: Information Systems Security Management Professional Questions and Answers

Question 5

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Options:

A.

Code Security law

B.

Trademark laws

C.

Copyright laws

D.

Patent laws

Question 6

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

Options:

A.

Operational audit

B.

Dependent audit

C.

Non-operational audit

D.

Independent audit

Question 7

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Vulnerability Assessment and Penetration Testing

B.

Security Certification and Accreditation (C&A)

C.

Change and Configuration Control

D.

Risk Adjustments

Question 8

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses TCP port 80 as the default port.

B.

It is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.

C.

It uses TCP port 443 as the default port.

D.

It is a protocol used to provide security for a database server in an internal network.

Page: 2 / 8
Total 218 questions