ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

A.
It performs vulnerabilitythreat analysis assessment.
A.
It performs vulnerabilitythreat analysis assessment.
Answers
B.
It provides for entry and storage of individual system data.
B.
It provides for entry and storage of individual system data.
Answers
C.
It provides data needed to accurately assess IA readiness.
C.
It provides data needed to accurately assess IA readiness.
Answers
D.
It identifies and generates IA requirements.
D.
It identifies and generates IA requirements.
Answers
Suggested answer: A, C, D

The functional analysis process is used for translating system requirements into detailed function criteria. Which of the following are the elements of functional analysis process Each correct answer represents a complete solution. Choose all that apply.

A.
Model possible overall system behaviors that are needed to achieve the system requirements.
A.
Model possible overall system behaviors that are needed to achieve the system requirements.
Answers
B.
Develop concepts and alternatives that are not technology or component bound.
B.
Develop concepts and alternatives that are not technology or component bound.
Answers
C.
Decompose functional requirements into discrete tasks or activities, the focus is still on technology not functions or components.
C.
Decompose functional requirements into discrete tasks or activities, the focus is still on technology not functions or components.
Answers
D.
Use a top-down with some bottom-up approach verification.
D.
Use a top-down with some bottom-up approach verification.
Answers
Suggested answer: A, B, D

Which of the following acts is endorsed to provide a clear statement of the proscribed activity concerning computers to the law enforcement community, those who own and operate computers, and those tempted to commit crimes by unauthorized access to computers

A.
Computer Fraud and Abuse Act
A.
Computer Fraud and Abuse Act
Answers
B.
Government Information Security Reform Act (GISRA)
B.
Government Information Security Reform Act (GISRA)
Answers
C.
Computer Security Act
C.
Computer Security Act
Answers
D.
Federal Information Security Management Act (FISMA)
D.
Federal Information Security Management Act (FISMA)
Answers
Suggested answer: A

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47 does the participating organizations perform the following tasks Perform preliminary activities. Examine all relevant technical, security and administrative issues. Form an agreement governing the management, operation, and use of the interconnection.

A.
Establishing the interconnection
A.
Establishing the interconnection
Answers
B.
Disconnecting the interconnection
B.
Disconnecting the interconnection
Answers
C.
Planning the interconnection
C.
Planning the interconnection
Answers
D.
Maintaining the interconnection
D.
Maintaining the interconnection
Answers
Suggested answer: C

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

A.
Phase 4
A.
Phase 4
Answers
B.
Phase 2
B.
Phase 2
Answers
C.
Phase 1
C.
Phase 1
Answers
D.
Phase 3
D.
Phase 3
Answers
Suggested answer: D

Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

A.
Information Assurance (IA)
A.
Information Assurance (IA)
Answers
B.
Information Systems Security Engineering (ISSE)
B.
Information Systems Security Engineering (ISSE)
Answers
C.
Information Protection Policy (IPP)
C.
Information Protection Policy (IPP)
Answers
D.
Information systems security (InfoSec)
D.
Information systems security (InfoSec)
Answers
Suggested answer: D

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event

A.
Earned value management
A.
Earned value management
Answers
B.
Risk audit
B.
Risk audit
Answers
C.
Corrective action
C.
Corrective action
Answers
D.
Technical performance measurement
D.
Technical performance measurement
Answers
Suggested answer: C

Which of the following CNSS policies describes the national policy on use of cryptomaterial by activities operating in high risk environments

A.
CNSSP No. 14
A.
CNSSP No. 14
Answers
B.
NCSC No. 5
B.
NCSC No. 5
Answers
C.
NSTISSP No. 6
C.
NSTISSP No. 6
Answers
D.
NSTISSP No. 7
D.
NSTISSP No. 7
Answers
Suggested answer: B

Which of the following sections of the SEMP template defines the project constraints, to include constraints on funding, personnel, facilities, manufacturing capability and capacity, critical resources, and other constraints

A.
Section 3.1.5
A.
Section 3.1.5
Answers
B.
Section 3.1.8
B.
Section 3.1.8
Answers
C.
Section 3.1.9
C.
Section 3.1.9
Answers
D.
Section 3.1.7
D.
Section 3.1.7
Answers
Suggested answer: B

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

A.
CL 3
A.
CL 3
Answers
B.
CL 4
B.
CL 4
Answers
C.
CL 2
C.
CL 2
Answers
D.
CL 1
D.
CL 1
Answers
Suggested answer: A
Total 214 questions
Go to page: of 22