ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems.

Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

A.
Level 4
A.
Level 4
Answers
B.
Level 5
B.
Level 5
Answers
C.
Level 1
C.
Level 1
Answers
D.
Level 2
D.
Level 2
Answers
E.
Level 3
E.
Level 3
Answers
Suggested answer: A

Which of the following is a type of security management for computers and networks in order to identify security breaches

A.
IPS
A.
IPS
Answers
B.
IDS
B.
IDS
Answers
C.
ASA
C.
ASA
Answers
D.
EAP
D.
EAP
Answers
Suggested answer: B

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

A.
Stateless packet filter firewall
A.
Stateless packet filter firewall
Answers
B.
PIX firewall
B.
PIX firewall
Answers
C.
Stateful packet filter firewall
C.
Stateful packet filter firewall
Answers
D.
Virtual firewall
D.
Virtual firewall
Answers
Suggested answer: C

Which of the following federal laws is designed to protect computer data from theft

A.
Federal Information Security Management Act (FISMA)
A.
Federal Information Security Management Act (FISMA)
Answers
B.
Computer Fraud and Abuse Act (CFAA)
B.
Computer Fraud and Abuse Act (CFAA)
Answers
C.
Government Information Security Reform Act (GISRA)
C.
Government Information Security Reform Act (GISRA)
Answers
D.
Computer Security Act
D.
Computer Security Act
Answers
Suggested answer: B

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

A.
ATM
A.
ATM
Answers
B.
RTM
B.
RTM
Answers
C.
CRO
C.
CRO
Answers
D.
DAA
D.
DAA
Answers
Suggested answer: B

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one

A.
Configuration Item Costing
A.
Configuration Item Costing
Answers
B.
Configuration Identification
B.
Configuration Identification
Answers
C.
Configuration Verification and Auditing
C.
Configuration Verification and Auditing
Answers
D.
Configuration Status Accounting
D.
Configuration Status Accounting
Answers
Suggested answer: A

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process

A.
Authorizing Official
A.
Authorizing Official
Answers
B.
Information system owner
B.
Information system owner
Answers
C.
Chief Information Officer (CIO)
C.
Chief Information Officer (CIO)
Answers
D.
Chief Risk Officer (CRO)
D.
Chief Risk Officer (CRO)
Answers
Suggested answer: B

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

A.
Internet Protocol Security (IPSec)
A.
Internet Protocol Security (IPSec)
Answers
B.
Common data security architecture (CDSA)
B.
Common data security architecture (CDSA)
Answers
C.
File encryptors
C.
File encryptors
Answers
D.
Application program interface (API)
D.
Application program interface (API)
Answers
Suggested answer: B

Which of the following protocols is used to establish a secure terminal to a remote network device

A.
WEP
A.
WEP
Answers
B.
SMTP
B.
SMTP
Answers
C.
SSH
C.
SSH
Answers
D.
IPSec
D.
IPSec
Answers
Suggested answer: C

Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system

A.
System firmware
A.
System firmware
Answers
B.
System software
B.
System software
Answers
C.
System interface
C.
System interface
Answers
D.
System hardware
D.
System hardware
Answers
Suggested answer: C
Total 214 questions
Go to page: of 22