Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISSEP PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISSEP PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISSEP Information Systems Security Engineering Professional
  • Last Update: Sep 12, 2025
  • Questions and Answers: 216
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISSEP Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISSEP Practice Exam Questions with Answers ISSEP Information Systems Security Engineering Professional Certification

Question # 6

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats

A.

System Security Context

B.

Information Protection Policy (IPP)

C.

CONOPS

D.

IMM

Full Access
Question # 7

Fill in the blank with an appropriate phrase. A ____________________ is defined as any activity that has an effect on defining, designing, building, or executing a task, requirement, or procedure.

A.

technical effort

Full Access
Question # 8

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle

A.

Phase 1, Definition

B.

Phase 3, Validation

C.

Phase 4, Post Accreditation Phase

D.

Phase 2, Verification

Full Access
Question # 9

Which of the following is an Information Assurance (IA) model that protects and defends information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

A.

Parkerian Hexad

B.

Five Pillars model

C.

Capability Maturity Model (CMM)

D.

Classic information security model

Full Access
Question # 10

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards Each correct answer represents a complete solution. Choose all that apply.

A.

CA Certification, Accreditation, and Security Assessments

B.

Information systems acquisition, development, and maintenance

C.

IR Incident Response

D.

SA System and Services Acquisition

Full Access
Question # 11

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability

A.

MAC I

B.

MAC II

C.

MAC IV

D.

MAC III

Full Access
Question # 12

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

A.

UDP

B.

SSL

C.

IPSec

D.

HTTP

Full Access
Question # 13

Which of the following assessment methodologies defines a six-step technical security evaluation

A.

FITSAF

B.

OCTAVE

C.

FIPS 102

D.

DITSCAP

Full Access
Question # 14

Which of the following types of CNSS issuances describes how to implement the policy or prescribes the manner of a policy

A.

Advisory memoranda

B.

Instructions

C.

Policies

D.

Directives

Full Access
Question # 15

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available

A.

Configuration Identification

B.

Configuration Verification and Audit

C.

Configuration Status and Accounting

D.

Configuration Control

Full Access
Question # 16

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47 does the participating organizations perform the following tasks Perform preliminary activities. Examine all relevant technical, security and administrative issues. Form an agreement governing the management, operation, and use of the interconnection.

A.

Establishing the interconnection

B.

Disconnecting the interconnection

C.

Planning the interconnection

D.

Maintaining the interconnection

Full Access
Question # 17

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing Standard

A.

Type III (E) cryptography

B.

Type III cryptography

C.

Type I cryptography

D.

Type II cryptography

Full Access
Question # 18

The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3. What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.

A.

Security operations

B.

Continue to review and refine the SSAA

C.

Change management

D.

Compliance validation

E.

System operations

F.

Maintenance of the SSAA

Full Access
Question # 19

Which of the following cooperative programs carried out by NIST speed ups the development of modern technologies for broad, national benefit by co-funding research and development partnerships with the private sector

A.

Baldrige National Quality Program

B.

Advanced Technology Program

C.

Manufacturing Extension Partnership

D.

NIST Laboratories

Full Access
Question # 20

The risk transference is referred to the transfer of risks to a third party, usually for a fee, it creates a contractual-relationship for the third party to manage the risk on behalf of the performing organization. Which one of the following is NOT an example of the transference risk response

A.

Warranties

B.

Performance bonds

C.

Use of insurance

D.

Life cycle costing

Full Access
Question # 21

Which of the following categories of system specification describes the technical requirements that cover a service, which is performed on a component of the system

A.

Product specification

B.

Process specification

C.

Material specification

D.

Development specification

Full Access
Question # 22

Fill in the blank with an appropriate phrase. _________________ is used to verify and accredit systems by making a standard process, set of activities, general tasks, and management structure.

A.

DITSCAPNIACAP

Full Access
Question # 23

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense

A.

DoD 5200.22-M

B.

DoD 8910.1

C.

DoD 5200.40

D.

DoD 8000.1

Full Access
Question # 24

Which of the following agencies serves the DoD community as the largest central resource for DoD and government-funded scientific, technical, engineering, and business related information available today

A.

DISA B.

DIAP

B.

DTIC

C.

DARPA

Full Access
Question # 25

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

A.

Internet Protocol Security (IPSec)

B.

Common data security architecture (CDSA)

C.

File encryptors

D.

Application program interface (API)

Full Access
Question # 26

Which of the following tasks obtains the customer agreement in planning the technical effort

A.

Task 9

B.

Task 11

C.

Task 8

D.

Task 10

Full Access
Question # 27

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation

A.

Chief Information Officer

B.

Chief Information Security Officer

C.

Chief Risk Officer

D.

Information System Owner

Full Access
Question # 28

Which of the following Registration Tasks sets up the business or operational functional description and system identification

A.

Registration Task 2

B.

Registration Task 1

C.

Registration Task 3

D.

Registration Task 4

Full Access
Question # 29

Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developed

A.

Security Control Assessment Task 3

B.

Security Control Assessment Task 1

C.

Security Control Assessment Task 4

D.

Security Control Assessment Task 2

Full Access
Question # 30

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident

A.

Corrective controls

B.

Safeguards

C.

Detective controls

D.

Preventive controls

Full Access
Question # 31

Which of the following NIST Special Publication documents provides a guideline on network security testing

A.

NIST SP 800-60

B.

NIST SP 800-37

C.

NIST SP 800-59

D.

NIST SP 800-42

E.

NIST SP 800-53A

F.

NIST SP 800-53

Full Access
Question # 32

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability

A.

MAC I

B.

MAC II

C.

MAC III

D.

MAC IV

Full Access
Question # 33

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

A.

DAS

B.

IDS

C.

ACL

D.

Ipsec

Full Access
Question # 34

Which of the following acts is endorsed to provide a clear statement of the proscribed activity concerning computers to the law enforcement community, those who own and operate computers, and those tempted to commit crimes by unauthorized access to computers

A.

Computer Fraud and Abuse Act

B.

Government Information Security Reform Act (GISRA)

C.

Computer Security Act

D.

Federal Information Security Management Act (FISMA)

Full Access
Question # 35

Which of the following agencies provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Full Access
Question # 36

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

A.

Quality Assurance Manager

B.

Senior Analyst

C.

System Owner

D.

Federal program manager

Full Access
Question # 37

Which of the following protocols is used to establish a secure terminal to a remote network device

A.

WEP

B.

SMTP

C.

SSH

D.

IPSec

Full Access
Question # 38

Which of the following DITSCAPNIACAP model phases is used to show the required evidence to support the DAA in accreditation process and conclude in an Approval To Operate (ATO)

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Full Access
Question # 39

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

A.

National Institute of Standards and Technology (NIST)

B.

National Security Agency (NSA)

C.

Committee on National Security Systems (CNSS)

D.

United States Congress

Full Access
Question # 40

Your project is an agricultural-based project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit. If your organization seizes this opportunity it would be an example of what risk response

A.

Enhancing

B.

Positive

C.

Opportunistic

D.

Exploiting

Full Access
Question # 41

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

A.

Certification and accreditation (C&A)

B.

Risk Management

C.

Information systems security engineering (ISSE)

D.

Information Assurance (IA)

Full Access
Question # 42

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.

A.

DC Security Design & Configuration

B.

EC Enclave and Computing Environment

C.

VI Vulnerability and Incident Management

D.

Information systems acquisition, development, and maintenance

Full Access
Question # 43

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Full Access
Question # 44

Which of the following refers to a process that is used for implementing information security

A.

Classic information security model

B.

Certification and Accreditation (C&A)

C.

Information Assurance (IA)

D.

Five Pillars model

Full Access
Question # 45

Choose and reorder the tasks performed in Plan the effort process.

A.
Full Access
Question # 46

Which of the following federal laws is designed to protect computer data from theft

A.

Federal Information Security Management Act (FISMA)

B.

Computer Fraud and Abuse Act (CFAA)

C.

Government Information Security Reform Act (GISRA)

D.

Computer Security Act

Full Access
Question # 47

FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact

A.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

B.

The loss of confidentiality, integrity, or availability might result in major financial losses.

C.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

D.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

Full Access
Question # 48

Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

A.

Information Assurance (IA)

B.

Information Systems Security Engineering (ISSE)

C.

Information Protection Policy (IPP)

D.

Information systems security (InfoSec)

Full Access
Question # 49

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

A.

ATM

B.

RTM

C.

CRO

D.

DAA

Full Access
Question # 50

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

A.

Risk Adjustments

B.

Security Certification and Accreditation (C&A)

C.

Vulnerability Assessment and Penetration Testing

D.

Change and Configuration Control

Full Access
Question # 51

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

A.

DTIC

B.

NSA IAD

C.

DIAP

D.

DARPA

Full Access
Question # 52

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals

A.

Moderate

B.

Medium

C.

High

D.

Low

Full Access
Question # 53

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

A.

Stateless packet filter firewall

B.

PIX firewall

C.

Stateful packet filter firewall

D.

Virtual firewall

Full Access
Question # 54

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems

A.

SSAA

B.

FITSAF

C.

FIPS

D.

TCSEC

Full Access
Question # 55

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

A.

Risk management plan

B.

Project charter

C.

Quality management plan

D.

Risk register

Full Access
Question # 56

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system

A.

SSAA

B.

TCSEC

C.

FIPS

D.

FITSAF

Full Access
Question # 57

Which of the following individuals reviews and approves project deliverables from a QA perspective

A.

Information systems security engineer

B.

System owner

C.

Quality assurance manager

D.

Project manager

Full Access
Question # 58

Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States

A.

Lanham Act

B.

FISMA

C.

Computer Fraud and Abuse Act

D.

Computer Misuse Act

Full Access
Question # 59

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality

A.

Information Protection Policy (IPP)

B.

IMM

C.

System Security Context

D.

CONOPS

Full Access
Question # 60

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart

A.

Risk response plan

B.

Quantitative analysis

C.

Risk response

D.

Contingency reserve

Full Access
Question # 61

Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities

A.

Advisory memoranda

B.

Directives

C.

Instructions

D.

Policies

Full Access
Question # 62

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment Each correct answer represents a part of the solution. Choose all that apply.

A.

Information Assurance Manager

B.

Designated Approving Authority

C.

Certification agent

D.

IS program manager

E.

User representative

Full Access
Question # 63

Which of the following sections of the SEMP template defines the project constraints, to include constraints on funding, personnel, facilities, manufacturing capability and capacity, critical resources, and other constraints

A.

Section 3.1.5

B.

Section 3.1.8

C.

Section 3.1.9

D.

Section 3.1.7

Full Access
Question # 64

You work as a systems engineer for BlueWell Inc. You want to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Which of the following processes will you use to accomplish the task

A.

Information Assurance (IA)

B.

Risk Management

C.

Risk Analysis

D.

Information Systems Security Engineering (ISSE)

Full Access