ExamGecko
Home / ISC / CISSP-ISSEP / List of questions
Ask Question

ISC CISSP-ISSEP Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems.

Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

Level 4
Level 4
Level 5
Level 5
Level 1
Level 1
Level 2
Level 2
Level 3
Level 3
Suggested answer: A
asked 18/09/2024
Guilherme Silva
27 questions

Question 2

Report Export Collapse

Which of the following is a type of security management for computers and networks in order to identify security breaches

IPS
IPS
IDS
IDS
ASA
ASA
EAP
EAP
Suggested answer: B
asked 18/09/2024
annalise ramdin
36 questions

Question 3

Report Export Collapse

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

Stateless packet filter firewall
Stateless packet filter firewall
PIX firewall
PIX firewall
Stateful packet filter firewall
Stateful packet filter firewall
Virtual firewall
Virtual firewall
Suggested answer: C
asked 18/09/2024
Joza Pakledinac
29 questions

Question 4

Report Export Collapse

Which of the following federal laws is designed to protect computer data from theft

Federal Information Security Management Act (FISMA)
Federal Information Security Management Act (FISMA)
Computer Fraud and Abuse Act (CFAA)
Computer Fraud and Abuse Act (CFAA)
Government Information Security Reform Act (GISRA)
Government Information Security Reform Act (GISRA)
Computer Security Act
Computer Security Act
Suggested answer: B
asked 18/09/2024
Vinayaka G D
39 questions

Question 5

Report Export Collapse

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

ATM
ATM
RTM
RTM
CRO
CRO
DAA
DAA
Suggested answer: B
asked 18/09/2024
Martin Schouten
41 questions

Question 6

Report Export Collapse

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one

Configuration Item Costing
Configuration Item Costing
Configuration Identification
Configuration Identification
Configuration Verification and Auditing
Configuration Verification and Auditing
Configuration Status Accounting
Configuration Status Accounting
Suggested answer: A
asked 18/09/2024
Sundarrajan Mugunthan
34 questions

Question 7

Report Export Collapse

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process

Authorizing Official
Authorizing Official
Information system owner
Information system owner
Chief Information Officer (CIO)
Chief Information Officer (CIO)
Chief Risk Officer (CRO)
Chief Risk Officer (CRO)
Suggested answer: B
asked 18/09/2024
Jean Presume
30 questions

Question 8

Report Export Collapse

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

Internet Protocol Security (IPSec)
Internet Protocol Security (IPSec)
Common data security architecture (CDSA)
Common data security architecture (CDSA)
File encryptors
File encryptors
Application program interface (API)
Application program interface (API)
Suggested answer: B
asked 18/09/2024
luis gilberto correa betancur
44 questions

Question 9

Report Export Collapse

Which of the following protocols is used to establish a secure terminal to a remote network device

WEP
WEP
SMTP
SMTP
SSH
SSH
IPSec
IPSec
Suggested answer: C
asked 18/09/2024
Hakan Köroğlu
34 questions

Question 10

Report Export Collapse

Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system

System firmware
System firmware
System software
System software
System interface
System interface
System hardware
System hardware
Suggested answer: C
asked 18/09/2024
Henock Asmerom
40 questions
Total 214 questions
Go to page: of 22
Search

Related questions