Free Practice Test

Free CISSP-ISSMP Practice Test – 2025 Updated

Prepare smarter for your CISSP-ISSMP exam with our free, accurate, and 2025-updated questions.

At Cert Empire, we are committed to providing the best and the latest exam questions to the aspiring students who are preparing for ISC2 CISSP-ISSMP Exam. To help the students prepare better, we have made sections of our CISSP-ISSMP exam preparation resources free for all. You can practice as much as you can with Free CISSP-ISSMP Practice Test.

ISC2 CISSP-ISSMP Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 60

Which of the following statements best describes the consequences of the disaster recovery plan test?

2 / 60

Which of the following enables an inventor to legally enforce his right to exclude others from using his invention?

3 / 60

You are documenting your organization's change control procedures for project management. What portion of the change control process oversees features and functions of the product scope?

4 / 60

Mark works as a security manager for SofTech Inc. He is working in a partially equipped office space which contains some of the system hardware, software, telecommunications, and power sources. In which of the following types of office sites is he working?

5 / 60

Which of the following is a process of monitoring data packets that travel across a network?

6 / 60

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location.
However, budget is an issue. Which of the following is most appropriate for this client?

7 / 60

Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?

8 / 60

James works as a security manager for SoftTech Inc. He has been working on the continuous process improvement and on the ordinal scale for measuring the maturity of the organization involved in the software processes. According to James, which of the following maturity levels of software CMM focuses on the continuous process improvement?

9 / 60

Which of the following roles is used to ensure that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?

10 / 60

Which of the following is the correct order of digital investigations Standard Operating
Procedure (SOP)?

11 / 60

Which of the following policies helps reduce the potential damage from the actions of one person?

12 / 60

Which of the following Acts enacted in United States amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?

13 / 60

Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?

14 / 60

Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes. Who decides the category of a change?

15 / 60

Which of the following statements is related with the first law of OPSEC?

16 / 60

Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?

17 / 60

Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?

18 / 60

In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?

19 / 60

Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?

20 / 60

You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?

21 / 60

Against which of the following does SSH provide protection? Each correct answer represents a complete solution. Choose two.

22 / 60

What is a stakeholder analysis chart?

23 / 60

Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."

24 / 60

Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?

25 / 60

A contract cannot have provisions for which one of the following?

26 / 60

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

27 / 60

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

28 / 60

What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.

29 / 60

Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?

30 / 60

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

31 / 60

Which of the following security models dictates that subjects can only access objects through applications?

32 / 60

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly.
What type of security audit do you need to conduct to resolve the problem?

33 / 60

Which of the following is the best method to stop vulnerability attacks on a Web server?

34 / 60

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

35 / 60

Which of the following penetration testing phases involves reconnaissance or data gathering?

36 / 60

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

37 / 60

You work as a Senior Marketing Manger for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning.
The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident. Which of the following steps of an incident handling process was performed by the incident response team?

38 / 60

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

39 / 60

Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.

40 / 60

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

41 / 60

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

42 / 60

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

43 / 60

Which of the following steps is the initial step in developing an information security strategy?

44 / 60

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

45 / 60

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?

46 / 60

Which of the following types of evidence is considered as the best evidence?

47 / 60

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

48 / 60

Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

49 / 60

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

50 / 60

Which of the following can be prevented by an organization using job rotation and separation of duties policies?

51 / 60

Fill in the blank with an appropriate phrase.________ models address specifications, requirements, and design, verification and validation, and maintenance activities.

52 / 60

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?

53 / 60

You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:

isc2 cissp-issmp exam demo question

 

 

 

How much capital should the project set aside for the risk contingency reserve?

54 / 60

Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?

55 / 60

Which of the following relies on a physical characteristic of the user to verify his identity?

56 / 60

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

57 / 60

Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?

58 / 60

Which of the following protocols is used with a tunneling protocol to provide security?

59 / 60

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

60 / 60

Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?

Your score is

The average score is 0%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE