ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











Which of the following individuals reviews and approves project deliverables from a QA perspective

A.
Information systems security engineer
A.
Information systems security engineer
Answers
B.
System owner
B.
System owner
Answers
C.
Quality assurance manager
C.
Quality assurance manager
Answers
D.
Project manager
D.
Project manager
Answers
Suggested answer: C

Which of the following memorandums reminds the departments and agencies of the OMB principles for including and funding security as an element of agency information technology systems and architectures and of the decision criteria which is used to evaluate security for information systems investments

A.
OMB M-00-13
A.
OMB M-00-13
Answers
B.
OMB M-99-18
B.
OMB M-99-18
Answers
C.
OMB M-00-07
C.
OMB M-00-07
Answers
D.
OMB M-03-19
D.
OMB M-03-19
Answers
Suggested answer: C

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives

A.
NIST SP 800-53A
A.
NIST SP 800-53A
Answers
B.
NIST SP 800-37
B.
NIST SP 800-37
Answers
C.
NIST SP 800-53
C.
NIST SP 800-53
Answers
D.
NIST SP 800-26
D.
NIST SP 800-26
Answers
E.
NIST SP 800-59
E.
NIST SP 800-59
Answers
F.
NIST SP 800-60
F.
NIST SP 800-60
Answers
Suggested answer: D

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards Each correct answer represents a complete solution. Choose all that apply.

A.
CA Certification, Accreditation, and Security Assessments
A.
CA Certification, Accreditation, and Security Assessments
Answers
B.
Information systems acquisition, development, and maintenance
B.
Information systems acquisition, development, and maintenance
Answers
C.
IR Incident Response
C.
IR Incident Response
Answers
D.
SA System and Services Acquisition
D.
SA System and Services Acquisition
Answers
Suggested answer: A, C, D

Which of the following is the acronym of RTM

A.
Resource tracking method
A.
Resource tracking method
Answers
B.
Requirements Testing Matrix
B.
Requirements Testing Matrix
Answers
C.
Requirements Traceability Matrix
C.
Requirements Traceability Matrix
Answers
D.
Resource timing method
D.
Resource timing method
Answers
Suggested answer: C

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation

A.
Chief Information Officer
A.
Chief Information Officer
Answers
B.
Chief Information Security Officer
B.
Chief Information Security Officer
Answers
C.
Chief Risk Officer
C.
Chief Risk Officer
Answers
D.
Information System Owner
D.
Information System Owner
Answers
Suggested answer: D

Which of the following is the application of statistical methods to the monitoring and control of a process to ensure that it operates at its full potential to produce conforming product

A.
Information Assurance (IA)
A.
Information Assurance (IA)
Answers
B.
Statistical process control (SPC)
B.
Statistical process control (SPC)
Answers
C.
Information Protection Policy (IPP)
C.
Information Protection Policy (IPP)
Answers
D.
Information management model (IMM)
D.
Information management model (IMM)
Answers
Suggested answer: B

Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual

A.
DoD 8910.1
A.
DoD 8910.1
Answers
B.
DoD 7950.1-M
B.
DoD 7950.1-M
Answers
C.
DoD 5200.22-M
C.
DoD 5200.22-M
Answers
D.
DoD 5200.1-R
D.
DoD 5200.1-R
Answers
E.
DoDD 8000.1
E.
DoDD 8000.1
Answers
Suggested answer: B

The phase 3 of the Risk Management Framework (RMF) process is known as mitigation planning. Which of the following processes take place in phase 3 Each correct answer represents a complete solution. Choose all that apply.

A.
Agree on a strategy to mitigate risks.
A.
Agree on a strategy to mitigate risks.
Answers
B.
Evaluate mitigation progress and plan next assessment.
B.
Evaluate mitigation progress and plan next assessment.
Answers
C.
Identify threats, vulnerabilities, and controls that will be evaluated.
C.
Identify threats, vulnerabilities, and controls that will be evaluated.
Answers
D.
Document and implement a mitigation plan.
D.
Document and implement a mitigation plan.
Answers
Suggested answer: A, B, D

Which of the following elements of Registration task 4 defines the operating system, database management system, and software applications, and how they will be used

A.
System firmware
A.
System firmware
Answers
B.
System interface
B.
System interface
Answers
C.
System software
C.
System software
Answers
D.
System hardware
D.
System hardware
Answers
Suggested answer: C
Total 214 questions
Go to page: of 22