Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

ISC ISSEP ISSEP Information Systems Security Engineering Professional Exam Practice Test

Demo: 32 questions
Total 221 questions

ISSEP Information Systems Security Engineering Professional Questions and Answers

Question 1

Stella works as a system engineer for BlueWell Inc. She wants to identify the performance thresholds of each build. Which of the following tests will help Stella to achieve her task

Options:

A.

Regression test

B.

Reliability test

C.

Functional test

D.

Performance test

Question 2

The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Providing IA Certification and Accreditation

B.

Providing command and control and situational awareness

C.

Defending systems

D.

Protecting information

Question 3

Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system

Options:

A.

Process specification

B.

Product specification

C.

Development specification

D.

System specification

Question 4

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSE provides advice on the impacts of system changes.

C.

An ISSE provides advice on the continuous monitoring of the information system.

D.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

E.

An ISSO takes part in the development activities that are required to implement system changes.

Question 5

Fill in the blank with an appropriate phrase. The ____________ helps the customer understand and document the information management needs that support the business or mission.

Options:

A.

systems engineer

Question 6

Which of the following are the benefits of SE as stated by MIL-STD-499B Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It develops work breakdown structures and statements of work.

B.

It establishes and maintains configuration management of the system.

C.

It develops needed user training equipment, procedures, and data.

D.

It provides high-quality products and services, with the correct people and performance features, at an affordable price, and on time.

Question 7

Which of the following processes describes the elements such as quantity, quality, coverage, timelines, and availability, and categorizes the different functions that the system will need to perform in order to gather the documented missionbusiness needs

Options:

A.

Functional requirements

B.

Operational scenarios

C.

Human factors

D.

Performance requirements

Question 8

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

Options:

A.

ATM

B.

RTM

C.

CRO

D.

DAA

Question 9

You have been tasked with finding an encryption methodology that will encrypt most types of email attachments. The requirements are that your solution must use the RSA algorithm. Which of the following is your best choice

Options:

A.

PGP

B.

SMIME

C.

DES

D.

Blowfish

Question 10

Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual

Options:

A.

DoD 8910.1

B.

DoD 7950.1-M

C.

DoD 5200.22-M

D.

DoD 5200.1-R

E.

DoDD 8000.1

Question 11

Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It performs vulnerabilitythreat analysis assessment.

B.

It provides for entry and storage of individual system data.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Question 12

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability

Options:

A.

MAC I

B.

MAC II

C.

MAC IV

D.

MAC III

Question 13

Which of the following are the most important tasks of the Information Management Plan (IMP) Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Define the Information Protection Policy (IPP).

B.

Define the System Security Requirements.

C.

Define the mission need.

D.

Identify how the organization manages its information.

Question 14

Which of the following agencies serves the DoD community as the largest central resource for DoD and government-funded scientific, technical, engineering, and business related information available today

Options:

A.

DISA B.

DIAP

B.

DTIC

C.

DARPA

Question 15

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews

Options:

A.

Abbreviated

B.

Significant

C.

Substantial

D.

Comprehensive

Question 16

Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system

Options:

A.

System firmware

B.

System software

C.

System interface

D.

System hardware

Question 17

Which of the of following departments protects and supports DoD information, information systems, and information networks that are critical to the department and the armed forces during the day-to-day operations, and in the time of crisis

Options:

A.

DIAP

B.

DARPA

C.

DTIC

D.

DISA

Question 18

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

Options:

A.

DTIC

B.

NSA IAD

C.

DIAP

D.

DARPA

Question 19

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

Options:

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Question 20

Which of the following cooperative programs carried out by NIST provides a nationwide network of local centers offering technical and business assistance to small manufacturers

Options:

A.

NIST Laboratories

B.

Advanced Technology Program

C.

Manufacturing Extension Partnership

D.

Baldrige National Quality Program

Question 21

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process

Options:

A.

Chief Information Officer

B.

Authorizing Official

C.

Common Control Provider

D.

Senior Agency Information Security Officer

Question 22

Which of the following acts promote a risk-based policy for cost effective security Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Clinger-Cohen Act

B.

Lanham Act

C.

Paperwork Reduction Act (PRA)

D.

Computer Misuse Act

Question 23

The principle of the SEMP is not to repeat the information, but rather to ensure that there are processes in place to conduct those functions. Which of the following sections of the SEMP template describes the work authorization procedures as well as change management approval processes

Options:

A.

Section 3.1.8

B.

Section 3.1.9

C.

Section 3.1.5

D.

Section 3.1.7

Question 24

FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact

Options:

A.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

B.

The loss of confidentiality, integrity, or availability might result in major financial losses.

C.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

D.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

Question 25

Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

SMIME

C.

TLS

D.

IPSec

Question 26

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

Options:

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Question 27

Which of the following individuals is an upper-level manager who has the power and capability to evaluate the mission, business case, and budgetary needs of the system while also considering the security risks

Options:

A.

User Representative

B.

Program Manager

C.

Certifier

D.

DAA

Question 28

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

Options:

A.

Stateless packet filter firewall

B.

PIX firewall

C.

Stateful packet filter firewall

D.

Virtual firewall

Question 29

Which of the following categories of system specification describes the technical requirements that cover a service, which is performed on a component of the system

Options:

A.

Product specification

B.

Process specification

C.

Material specification

D.

Development specification

Question 30

Which of the following tasks prepares the technical management plan in planning the technical effort

Options:

A.

Task 10

B.

Task 9

C.

Task 7

D.

Task 8

Question 31

Which of the following federal laws is designed to protect computer data from theft

Options:

A.

Federal Information Security Management Act (FISMA)

B.

Computer Fraud and Abuse Act (CFAA)

C.

Government Information Security Reform Act (GISRA)

D.

Computer Security Act

Question 32

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur

Options:

A.

Continuous Monitoring

B.

Initiation

C.

Security Certification

D.

Security Accreditation

Demo: 32 questions
Total 221 questions