Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! CISSP-ISSEP has been withdrawn.

CISSP-ISSEP Practice Exam Questions with Answers ISSEP Information Systems Security Engineering Professional Certification

Question # 6

Which of the following protocols is used to establish a secure terminal to a remote network device

A.

WEP

B.

SMTP

C.

SSH

D.

IPSec

Full Access
Question # 7

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats

A.

System Security Context

B.

Information Protection Policy (IPP)

C.

CONOPS

D.

IMM

Full Access
Question # 8

Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production Each correct answer represents a part of the solution. Choose all that apply.

A.

Office of Management and Budget (OMB)

B.

NIST

C.

FISMA

D.

FIPS

Full Access
Question # 9

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event

A.

Acceptance

B.

Enhance

C.

Share

D.

Exploit

Full Access
Question # 10

Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems

A.

National Security AgencyCentral Security Service (NSACSS)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Full Access
Question # 11

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

A.

National Institute of Standards and Technology (NIST)

B.

National Security Agency (NSA)

C.

Committee on National Security Systems (CNSS)

D.

United States Congress

Full Access
Question # 12

Which of the following processes describes the elements such as quantity, quality, coverage, timelines, and availability, and categorizes the different functions that the system will need to perform in order to gather the documented missionbusiness needs

A.

Functional requirements

B.

Operational scenarios

C.

Human factors

D.

Performance requirements

Full Access
Question # 13

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing Standard

A.

Type III (E) cryptography

B.

Type III cryptography

C.

Type I cryptography

D.

Type II cryptography

Full Access
Question # 14

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors

A.

Federal Information Processing Standards (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP

Full Access
Question # 15

You work as a security engineer for BlueWell Inc. You are working on the ISSE model. In which of the following phases of the ISSE model is the system defined in terms of what security is needed

A.

Define system security architecture

B.

Develop detailed security design

C.

Discover information protection needs

D.

Define system security requirements

Full Access
Question # 16

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability

A.

MAC I

B.

MAC II

C.

MAC III

D.

MAC IV

Full Access
Question # 17

Which of the following agencies provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Full Access
Question # 18

Which of the following are the phases of the Certification and Accreditation (C&A) process Each correct answer represents a complete solution. Choose two.

A.

Auditing

B.

Initiation

C.

Continuous Monitoring

D.

Detection

Full Access
Question # 19

You work as a security engineer for BlueWell Inc. According to you, which of the following DITSCAPNIACAP model phases occurs at the initiation of the project, or at the initial C&A effort of a legacy system

A.

Post Accreditation

B.

Definition

C.

Verification

D.

Validation

Full Access
Question # 20

Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system

A.

Security Control Assessment Task 4

B.

Security Control Assessment Task 3

C.

Security Control Assessment Task 1

D.

Security Control Assessment Task 2

Full Access
Question # 21

Fill in the blank with an appropriate phrase. A ____________________ is defined as any activity that has an effect on defining, designing, building, or executing a task, requirement, or procedure.

A.

technical effort

Full Access
Question # 22

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47 does the participating organizations perform the following tasks Perform preliminary activities. Examine all relevant technical, security and administrative issues. Form an agreement governing the management, operation, and use of the interconnection.

A.

Establishing the interconnection

B.

Disconnecting the interconnection

C.

Planning the interconnection

D.

Maintaining the interconnection

Full Access
Question # 23

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Full Access
Question # 24

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

A.

Risk management plan

B.

Project charter

C.

Quality management plan

D.

Risk register

Full Access
Question # 25

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Full Access
Question # 26

Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management

A.

Computer Misuse Act

B.

Clinger-Cohen Act

C.

ISG

D.

Lanham Act

Full Access
Question # 27

Della works as a security engineer for BlueWell Inc. She wants to establish configuration management and control procedures that will document proposed or actual changes to the information system. Which of the following phases of NIST SP 800-37 C&A methodology will define the above task

A.

Security Certification

B.

Security Accreditation

C.

Initiation

D.

Continuous Monitoring

Full Access
Question # 28

You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process

A.

Configuration management plan

B.

Transition plan

C.

Systems engineering management plan (SEMP)

D.

Acquisition plan

Full Access
Question # 29

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system

A.

System Owner

B.

Information Systems Security Officer (ISSO)

C.

Designated Approving Authority (DAA)

D.

Chief Information Security Officer (CISO)

Full Access
Question # 30

Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will Della use to accomplish the task

A.

Risk analysis

B.

Functional allocation

C.

Functional analysis

D.

Functional baseline

Full Access
Question # 31

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

A.

DAS

B.

IDS

C.

ACL

D.

Ipsec

Full Access