ISC CISSP-ISSEP Practice Test - Questions Answers, Page 14
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 131
 
                            
                            
                                Which of the following tasks describes the processes required to ensure that the project includes all the work required, and only the work required, to complete the project successfully
Question 132
 
                            
                            
                                System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization
Process. What are the different phases of System Authorization Plan Each correct answer represents a part of the solution. Choose all that apply.
Question 133
 
                            
                            
                                Which of the following CNSS policies describes the national policy on securing voice communications
Question 134
 
                            
                            
                                Which of the following phases of NIST SP 800-37 C&A methodology examines the residual risk for acceptability, and prepares the final security accreditation package
Question 135
 
                            
                            
                                Which of the following are the phases of the Certification and Accreditation (C&A) process Each correct answer represents a complete solution. Choose two.
Question 136
 
                            
                            
                                Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase
Question 137
 
                            
                            
                                Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.
Question 138
 
                            
                            
                                Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it
Question 139
 
                            
                            
                                Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system
Question 140
 
                            
                            
                                You have been tasked with finding an encryption methodology that will encrypt most types of email attachments. The requirements are that your solution must use the RSA algorithm. Which of the following is your best choice
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question