ExamGecko
Home / ISC / CISSP-ISSEP / List of questions
Ask Question

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 15

List of questions

Question 141

Report Export Collapse

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

Become a Premium Member for full access
  Unlock Premium Member

Question 142

Report Export Collapse

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy Each correct answer represents a part of the solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 143

Report Export Collapse

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive

Branch agencies

Become a Premium Member for full access
  Unlock Premium Member

Question 144

Report Export Collapse

Which of the following describes a residual risk as the risk remaining after a risk mitigation has occurred

Become a Premium Member for full access
  Unlock Premium Member

Question 145

Report Export Collapse

Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will

Della use to accomplish the task

Become a Premium Member for full access
  Unlock Premium Member

Question 146

Report Export Collapse

SIMULATION

Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

Become a Premium Member for full access
  Unlock Premium Member

Question 147

Report Export Collapse

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

Become a Premium Member for full access
  Unlock Premium Member

Question 148

Report Export Collapse

Which of the following cooperative programs carried out by NIST speed ups the development of modern technologies for broad, national benefit by co-funding research and development partnerships with the private sector

Become a Premium Member for full access
  Unlock Premium Member

Question 149

Report Export Collapse

The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series

Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 150

Report Export Collapse

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

Become a Premium Member for full access
  Unlock Premium Member
Total 214 questions
Go to page: of 22
Search

Related questions