ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

A.
Trusted computing base (TCB)
A.
Trusted computing base (TCB)
Answers
B.
Common data security architecture (CDSA)
B.
Common data security architecture (CDSA)
Answers
C.
Internet Protocol Security (IPSec)
C.
Internet Protocol Security (IPSec)
Answers
D.
Application program interface (API)
D.
Application program interface (API)
Answers
Suggested answer: A

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy Each correct answer represents a part of the solution. Choose all that apply.

A.
What is being secured
A.
What is being secured
Answers
B.
Who is expected to comply with the policy
B.
Who is expected to comply with the policy
Answers
C.
Where is the vulnerability, threat, or risk
C.
Where is the vulnerability, threat, or risk
Answers
D.
Who is expected to exploit the vulnerability
D.
Who is expected to exploit the vulnerability
Answers
Suggested answer: A, B, C

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive

Branch agencies

A.
NSACSS
A.
NSACSS
Answers
B.
OMB
B.
OMB
Answers
C.
DCAA
C.
DCAA
Answers
D.
NIST
D.
NIST
Answers
Suggested answer: B

Which of the following describes a residual risk as the risk remaining after a risk mitigation has occurred

A.
SSAA
A.
SSAA
Answers
B.
ISSO
B.
ISSO
Answers
C.
DAA
C.
DAA
Answers
D.
DIACAP
D.
DIACAP
Answers
Suggested answer: D

Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will

Della use to accomplish the task

A.
Risk analysis
A.
Risk analysis
Answers
B.
Functional allocation
B.
Functional allocation
Answers
C.
Functional analysis
C.
Functional analysis
Answers
D.
Functional baseline
D.
Functional baseline
Answers
Suggested answer: C

SIMULATION

Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

A.
functional analysis
A.
functional analysis
Answers
Suggested answer: A

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

A.
NSTISSP No. 7
A.
NSTISSP No. 7
Answers
B.
NSTISSP No. 11
B.
NSTISSP No. 11
Answers
C.
NSTISSP No. 6
C.
NSTISSP No. 6
Answers
D.
NSTISSP No. 101
D.
NSTISSP No. 101
Answers
Suggested answer: C

Which of the following cooperative programs carried out by NIST speed ups the development of modern technologies for broad, national benefit by co-funding research and development partnerships with the private sector

A.
Baldrige National Quality Program
A.
Baldrige National Quality Program
Answers
B.
Advanced Technology Program
B.
Advanced Technology Program
Answers
C.
Manufacturing Extension Partnership
C.
Manufacturing Extension Partnership
Answers
D.
NIST Laboratories
D.
NIST Laboratories
Answers
Suggested answer: B

The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series

Each correct answer represents a complete solution. Choose all that apply.

A.
Providing IA Certification and Accreditation
A.
Providing IA Certification and Accreditation
Answers
B.
Providing command and control and situational awareness
B.
Providing command and control and situational awareness
Answers
C.
Defending systems
C.
Defending systems
Answers
D.
Protecting information
D.
Protecting information
Answers
Suggested answer: B, C, D

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

A.
Type I cryptography
A.
Type I cryptography
Answers
B.
Type II cryptography
B.
Type II cryptography
Answers
C.
Type III (E) cryptography
C.
Type III (E) cryptography
Answers
D.
Type III cryptography
D.
Type III cryptography
Answers
Suggested answer: B
Total 214 questions
Go to page: of 22