Question 37

Which of the following attacks can be mitigated by providing proper training to the employees in an organization?

Correct Answer:A

Question 38

You work as a Product manager for Marioiss Inc. You have been tasked to start a project for securing the network of your company. You want to employ configuration management to efficiently manage the procedures of the project. What will be the benefits of employing configuration management for completing this project? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BD

Question 39

What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ACD

Question 40

Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

Correct Answer:D

Question 41

Which of the following is used to back up forensic evidences or data folders from the network or locally attached hard disk drives?

Correct Answer:D

Question 42

Which of the following statements about Hypertext Transfer Protocol Secure (HTTPS) are true? Each correct answer represents a complete solution. Choose two.

Correct Answer:BC

START ISSMP EXAM