Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ISC CISSP-ISSEP ISSEP Information Systems Security Engineering Professional Exam Practice Test

Demo: 31 questions
Total 213 questions

ISSEP Information Systems Security Engineering Professional Questions and Answers

Question 1

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DC Security Design & Configuration

B.

EC Enclave and Computing Environment

C.

VI Vulnerability and Incident Management

D.

Information systems acquisition, development, and maintenance

Question 2

Which of the following DoD policies establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels

Options:

A.

DoD 8500.1 Information Assurance (IA)

B.

DoD 8500.2 Information Assurance Implementation

C.

DoDI 5200.40

D.

DoD 8510.1-M DITSCAP

Question 3

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

What is being secured

B.

Who is expected to comply with the policy

C.

Where is the vulnerability, threat, or risk

D.

Who is expected to exploit the vulnerability

Question 4

TQM recognizes that quality of all the processes within an organization contribute to the quality of the product. Which of the following are the most important activities in the Total Quality Management Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Quality renewal

B.

Maintenance of quality

C.

Quality costs

D.

Quality improvements

Question 5

Which of the following categories of system specification describes the technical requirements that cover a service, which is performed on a component of the system

Options:

A.

Product specification

B.

Process specification

C.

Material specification

D.

Development specification

Question 6

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

Options:

A.

Operational scenarios

B.

Functional requirements

C.

Human factors

D.

Performance requirements

Question 7

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Type accreditation

B.

Site accreditation

C.

System accreditation

D.

Secure accreditation

Question 8

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing Standard

Options:

A.

Type III (E) cryptography

B.

Type III cryptography

C.

Type I cryptography

D.

Type II cryptography

Question 9

Which of the following federal laws is designed to protect computer data from theft

Options:

A.

Federal Information Security Management Act (FISMA)

B.

Computer Fraud and Abuse Act (CFAA)

C.

Government Information Security Reform Act (GISRA)

D.

Computer Security Act

Question 10

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event

Options:

A.

Earned value management

B.

Risk audit

C.

Corrective action

D.

Technical performance measurement

Question 11

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

Options:

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Question 12

Lisa is the project manager of the SQL project for her company. She has completed the risk response planning with her project team and is now ready to update the risk register to reflect the risk response. Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created

Options:

A.

The level of detail must define exactly the risk response for each identified risk.

B.

The level of detail is set of project risk governance.

C.

The level of detail is set by historical information.

D.

The level of detail should correspond with the priority ranking.

Question 13

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies

Options:

A.

NSACSS

B.

OMB

C.

DCAA

D.

NIST

Question 14

Which of the following NIST documents describes that minimizing negative impact on an organization and a need for sound basis in decision making are the fundamental reasons organizations implement a risk management process for their IT systems

Options:

A.

NIST SP 800-37

B.

NIST SP 800-30

C.

NIST SP 800-53

D.

NIST SP 800-60

Question 15

According to which of the following DoD policies, the implementation of DITSCAP is mandatory for all the systems that process both DoD classified and unclassified information?

Options:

A.

DoD 8500.2

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.1 (IAW)

Question 16

You have been tasked with finding an encryption methodology that will encrypt most types of email attachments. The requirements are that your solution must use the RSA algorithm. Which of the following is your best choice

Options:

A.

PGP

B.

SMIME

C.

DES

D.

Blowfish

Question 17

Which of the following are the most important tasks of the Information Management Plan (IMP) Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Define the Information Protection Policy (IPP).

B.

Define the System Security Requirements.

C.

Define the mission need.

D.

Identify how the organization manages its information.

Question 18

Which of the following individuals reviews and approves project deliverables from a QA perspective

Options:

A.

Information systems security engineer

B.

System owner

C.

Quality assurance manager

D.

Project manager

Question 19

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

Options:

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Question 20

Which of the following statements is true about residual risks

Options:

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is a weakness or lack of safeguard that can be exploited by a threat.

C.

It is the probabilistic risk after implementing all security measures.

D.

It is the probabilistic risk before implementing all security measures.

Question 21

You work as a Network Administrator for PassGuide Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security

Options:

A.

HTTP

B.

VPN

C.

SMIME

D.

SSL

Question 22

Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States

Options:

A.

Lanham Act

B.

FISMA

C.

Computer Fraud and Abuse Act

D.

Computer Misuse Act

Question 23

Which of the following cooperative programs carried out by NIST encourages performance excellence among U.S. manufacturers, service companies, educational institutions, and healthcare providers

Options:

A.

Manufacturing Extension Partnership

B.

Baldrige National Quality Program

C.

Advanced Technology Program

D.

NIST Laboratories

Question 24

Fill in the blanks with an appropriate phrase. A ________ is an approved build of the product, and can be a single component or a combination of components.

Options:

A.

development baseline

Question 25

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

Options:

A.

Certification and accreditation (C&A)

B.

Risk Management

C.

Information systems security engineering (ISSE)

D.

Information Assurance (IA)

Question 26

Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment

Options:

A.

Definition, Validation, Verification, and Post Accreditation

B.

Verification, Definition, Validation, and Post Accreditation

C.

Verification, Validation, Definition, and Post Accreditation

D.

Definition, Verification, Validation, and Post Accreditation

Question 27

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response

Options:

A.

Project sponsor

B.

Risk owner

C.

Diane

D.

Subject matter expert

Question 28

Which of the following roles is also known as the accreditor

Options:

A.

Data owner

B.

Chief Information Officer

C.

Chief Risk Officer

D.

Designated Approving Authority

Question 29

Which of the following rated systems of the Orange book has mandatory protection of the TCB

Options:

A.

C-rated

B.

B-rated

C.

D-rated

D.

A-rated

Question 30

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

Options:

A.

DTIC

B.

NSA IAD

C.

DIAP

D.

DARPA

Question 31

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Regulatory

B.

Advisory

C.

Systematic

D.

Informative

Demo: 31 questions
Total 213 questions