ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a temporary approval to operate based on an assessment of the implementation status of the assigned IA Controls

A.
IATO
A.
IATO
Answers
B.
DATO
B.
DATO
Answers
C.
ATO
C.
ATO
Answers
D.
IATT
D.
IATT
Answers
Suggested answer: A

Which of the following phases of the ISSE model is used to determine why the system needs to be built and what information needs to be protected

A.
Develop detailed security design
A.
Develop detailed security design
Answers
B.
Define system security requirements
B.
Define system security requirements
Answers
C.
Discover information protection needs
C.
Discover information protection needs
Answers
D.
Define system security architecture
D.
Define system security architecture
Answers
Suggested answer: C

Which of the following Net-Centric Data Strategy goals are required to increase enterprise and community data over private user and system data Each correct answer represents a complete solution. Choose all that apply.

A.
Understandability
A.
Understandability
Answers
B.
Visibility
B.
Visibility
Answers
C.
Interoperability
C.
Interoperability
Answers
D.
Accessibility
D.
Accessibility
Answers
Suggested answer: B, D

Which of the following acts assigns the Chief Information Officers (CIO) with the responsibility to develop Information Technology Architectures (ITAs) and is also referred to as the Information Technology Management Reform Act (ITMRA)

A.
Paperwork Reduction Act
A.
Paperwork Reduction Act
Answers
B.
Computer Misuse Act
B.
Computer Misuse Act
Answers
C.
Lanham Act
C.
Lanham Act
Answers
D.
Clinger Cohen Act
D.
Clinger Cohen Act
Answers
Suggested answer: D

Which of the following types of CNSS issuances describes how to implement the policy or prescribes the manner of a policy

A.
Advisory memoranda
A.
Advisory memoranda
Answers
B.
Instructions
B.
Instructions
Answers
C.
Policies
C.
Policies
Answers
D.
Directives
D.
Directives
Answers
Suggested answer: B

The Concept of Operations (CONOPS) is a document describing the characteristics of a proposed system from the viewpoint of an individual who will use that system. Which of the following points are included in CONOPS Each correct answer represents a complete solution. Choose all that apply.

A.
Strategies, tactics, policies, and constraints affecting the system
A.
Strategies, tactics, policies, and constraints affecting the system
Answers
B.
Organizations, activities, and interactions among participants and stakeholders
B.
Organizations, activities, and interactions among participants and stakeholders
Answers
C.
Statement of the structure of the system
C.
Statement of the structure of the system
Answers
D.
Clear statement of responsibilities and authorities delegated
D.
Clear statement of responsibilities and authorities delegated
Answers
E.
Statement of the goals and objectives of the system
E.
Statement of the goals and objectives of the system
Answers
Suggested answer: A, B, D, E

Which of the following processes describes the elements such as quantity, quality, coverage, timelines, and availability, and categorizes the different functions that the system will need to perform in order to gather the documented missionbusiness needs

A.
Functional requirements
A.
Functional requirements
Answers
B.
Operational scenarios
B.
Operational scenarios
Answers
C.
Human factors
C.
Human factors
Answers
D.
Performance requirements
D.
Performance requirements
Answers
Suggested answer: A

Which of the following DoD policies establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels

A.
DoD 8500.1 Information Assurance (IA)
A.
DoD 8500.1 Information Assurance (IA)
Answers
B.
DoD 8500.2 Information Assurance Implementation
B.
DoD 8500.2 Information Assurance Implementation
Answers
C.
DoDI 5200.40
C.
DoDI 5200.40
Answers
D.
DoD 8510.1-M DITSCAP
D.
DoD 8510.1-M DITSCAP
Answers
Suggested answer: B

SIMULATION

Fill in the blank with an appropriate phrase. _________________ is used to verify and accredit systems by making a standard process, set of activities, general tasks, and management structure.

A.
DITSCAPNIACAP
A.
DITSCAPNIACAP
Answers
Suggested answer: A

SIMULATION

Fill in the blank with an appropriate phrase. The ______________ process is used for allocating performance and designing the requirements to each function.

A.
functional allocation
A.
functional allocation
Answers
Suggested answer: A
Total 214 questions
Go to page: of 22