ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a

DITSCAP assessment

A.
Definition, Validation, Verification, and Post Accreditation
A.
Definition, Validation, Verification, and Post Accreditation
Answers
B.
Verification, Definition, Validation, and Post Accreditation
B.
Verification, Definition, Validation, and Post Accreditation
Answers
C.
Verification, Validation, Definition, and Post Accreditation
C.
Verification, Validation, Definition, and Post Accreditation
Answers
D.
Definition, Verification, Validation, and Post Accreditation
D.
Definition, Verification, Validation, and Post Accreditation
Answers
Suggested answer: D

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

A.
National Institute of Standards and Technology (NIST)
A.
National Institute of Standards and Technology (NIST)
Answers
B.
National Security Agency (NSA)
B.
National Security Agency (NSA)
Answers
C.
Committee on National Security Systems (CNSS)
C.
Committee on National Security Systems (CNSS)
Answers
D.
United States Congress
D.
United States Congress
Answers
Suggested answer: A

SIMULATION

Fill in the blank with an appropriate phrase. The ____________ helps the customer understand and document the information management needs that support the business or mission.

A.
systems engineer
A.
systems engineer
Answers
Suggested answer:

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards Each correct answer represents a complete solution.

Choose all that apply.

A.
Organization of information security
A.
Organization of information security
Answers
B.
Human resources security
B.
Human resources security
Answers
C.
Risk assessment and treatment
C.
Risk assessment and treatment
Answers
D.
AU audit and accountability
D.
AU audit and accountability
Answers
Suggested answer: A, B, C

Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist

A.
CL 2
A.
CL 2
Answers
B.
CL 3
B.
CL 3
Answers
C.
CL 1
C.
CL 1
Answers
D.
CL 4
D.
CL 4
Answers
Suggested answer: C

Which of the following cooperative programs carried out by NIST provides a nationwide network of local centers offering technical and business assistance to small manufacturers

A.
NIST Laboratories
A.
NIST Laboratories
Answers
B.
Advanced Technology Program
B.
Advanced Technology Program
Answers
C.
Manufacturing Extension Partnership
C.
Manufacturing Extension Partnership
Answers
D.
Baldrige National Quality Program
D.
Baldrige National Quality Program
Answers
Suggested answer: C

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense

A.
DoD 5200.22-M
A.
DoD 5200.22-M
Answers
B.
DoD 8910.1
B.
DoD 8910.1
Answers
C.
DoD 5200.40
C.
DoD 5200.40
Answers
D.
DoD 8000.1
D.
DoD 8000.1
Answers
Suggested answer: C

You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process

A.
Design information systems that will meet the certification and accreditation documentation.
A.
Design information systems that will meet the certification and accreditation documentation.
Answers
B.
Identify the information protection needs.
B.
Identify the information protection needs.
Answers
C.
Ensure information systems are designed and developed with functional relevance.
C.
Ensure information systems are designed and developed with functional relevance.
Answers
D.
Instruct systems engineers on availability, integrity, and confidentiality.
D.
Instruct systems engineers on availability, integrity, and confidentiality.
Answers
Suggested answer: B

Which of the following is NOT an objective of the security program

A.
Security education
A.
Security education
Answers
B.
Information classification
B.
Information classification
Answers
C.
Security organization
C.
Security organization
Answers
D.
Security plan
D.
Security plan
Answers
Suggested answer: D

The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise. What are the responsibilities of a Chief Information Officer Each correct answer represents a complete solution. Choose all that apply.

A.
Proposing the information technology needed by an enterprise to achieve its goals and then working within a budget to implement the plan
A.
Proposing the information technology needed by an enterprise to achieve its goals and then working within a budget to implement the plan
Answers
B.
Preserving high-level communications and working group relationships in an organization
B.
Preserving high-level communications and working group relationships in an organization
Answers
C.
Establishing effective continuous monitoring program for the organization
C.
Establishing effective continuous monitoring program for the organization
Answers
D.
Facilitating the sharing of security risk-related information among authorizing officials
D.
Facilitating the sharing of security risk-related information among authorizing officials
Answers
Suggested answer: A, B, C
Total 214 questions
Go to page: of 22