Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISSEP PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISSEP PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISSEP Information Systems Security Engineering Professional
  • Last Update: May 4, 2024
  • Questions and Answers: 221
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISSEP Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISSEP Practice Exam Questions with Answers ISSEP Information Systems Security Engineering Professional Certification

Question # 6

Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities

A.

Advisory memoranda

B.

Directives

C.

Instructions

D.

Policies

Full Access
Question # 7

Choose and reorder the security certification document tasks.

A.

Full Access
Question # 8

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies

A.

NSACSS

B.

OMB

C.

DCAA

D.

NIST

Full Access
Question # 9

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan Each correct answer represents a part of the solution. Choose all that apply.

A.

Certification

B.

Authorization

C.

Post-certification

D.

Post-Authorization

E.

Pre-certification

Full Access
Question # 10

Which of the following roles is also known as the accreditor

A.

Data owner

B.

Chief Information Officer

C.

Chief Risk Officer

D.

Designated Approving Authority

Full Access
Question # 11

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

A.

FIPS 200

B.

NIST SP 800-50

C.

Traceability matrix

D.

FIPS 199

Full Access
Question # 12

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

A.

Internet Key Exchange (IKE) Protocol

B.

SMIME

C.

Internet Protocol Security (IPSec)

D.

Secure Socket Layer (SSL)

Full Access
Question # 13

Which of the following statements is true about residual risks

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is a weakness or lack of safeguard that can be exploited by a threat.

C.

It is the probabilistic risk after implementing all security measures.

D.

It is the probabilistic risk before implementing all security measures.

Full Access
Question # 14

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur

A.

Continuous Monitoring

B.

Initiation

C.

Security Certification

D.

Security Accreditation

Full Access
Question # 15

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution. Choose two.

A.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

C.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

D.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Full Access
Question # 16

Which of the following is a temporary approval to operate based on an assessment of the implementation status of the assigned IA Controls

A.

IATO

B.

DATO

C.

ATO

D.

IATT

Full Access
Question # 17

Which of the following phases of NIST SP 800-37 C&A methodology examines the residual risk for acceptability, and prepares the final security accreditation package

A.

Initiation

B.

Security Certification

C.

Continuous Monitoring

D.

Security Accreditation

Full Access
Question # 18

Which of the following Registration Tasks sets up the business or operational functional description and system identification

A.

Registration Task 2

B.

Registration Task 1

C.

Registration Task 3

D.

Registration Task 4

Full Access
Question # 19

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.

A.

DC Security Design & Configuration

B.

EC Enclave and Computing Environment

C.

VI Vulnerability and Incident Management

D.

Information systems acquisition, development, and maintenance

Full Access
Question # 20

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

A.

DAS

B.

IDS

C.

ACL

D.

Ipsec

Full Access
Question # 21

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Full Access
Question # 22

You work as a Network Administrator for PassGuide Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security

A.

HTTP

B.

VPN

C.

SMIME

D.

SSL

Full Access
Question # 23

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Full Access
Question # 24

Which of the following is a type of security management for computers and networks in order to identify security breaches

A.

IPS

B.

IDS

C.

ASA

D.

EAP

Full Access
Question # 25

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one

A.

Configuration Item Costing

B.

Configuration Identification

C.

Configuration Verification and Auditing

D.

Configuration Status Accounting

Full Access
Question # 26

Which of the following cooperative programs carried out by NIST speed ups the development of modern technologies for broad, national benefit by co-funding research and development partnerships with the private sector

A.

Baldrige National Quality Program

B.

Advanced Technology Program

C.

Manufacturing Extension Partnership

D.

NIST Laboratories

Full Access
Question # 27

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards Each correct answer represents a complete solution. Choose all that apply.

A.

Organization of information security

B.

Human resources security

C.

Risk assessment and treatment

D.

AU audit and accountability

Full Access
Question # 28

Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

A.

Information Assurance (IA)

B.

Information Systems Security Engineering (ISSE)

C.

Information Protection Policy (IPP)

D.

Information systems security (InfoSec)

Full Access
Question # 29

You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process

A.

Design information systems that will meet the certification and accreditation documentation.

B.

Identify the information protection needs.

C.

Ensure information systems are designed and developed with functional relevance.

D.

Instruct systems engineers on availability, integrity, and confidentiality.

Full Access
Question # 30

Which of the following are the most important tasks of the Information Management Plan (IMP) Each correct answer represents a complete solution. Choose all that apply.

A.

Define the Information Protection Policy (IPP).

B.

Define the System Security Requirements.

C.

Define the mission need.

D.

Identify how the organization manages its information.

Full Access
Question # 31

Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems

A.

National Security AgencyCentral Security Service (NSACSS)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Full Access
Question # 32

Choose and reorder the steps to built the system security architectures in accordance with the DoDAF.

A.

Full Access