ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











Della works as a security engineer for BlueWell Inc. She wants to establish configuration management and control procedures that will document proposed or actual changes to the information system. Which of the following phases of NIST

SP 800-37 C&A methodology will define the above task

A.
Security Certification
A.
Security Certification
Answers
B.
Security Accreditation
B.
Security Accreditation
Answers
C.
Initiation
C.
Initiation
Answers
D.
Continuous Monitoring
D.
Continuous Monitoring
Answers
Suggested answer: D

Which of the following types of CNSS issuances establishes or describes policy and programs, provides authority, or assigns responsibilities

A.
Instructions
A.
Instructions
Answers
B.
Directives
B.
Directives
Answers
C.
Policies
C.
Policies
Answers
D.
Advisory memoranda
D.
Advisory memoranda
Answers
Suggested answer: B

Which of the following individuals is an upper-level manager who has the power and capability to evaluate the mission, business case, and budgetary needs of the system while also considering the security risks

A.
User Representative
A.
User Representative
Answers
B.
Program Manager
B.
Program Manager
Answers
C.
Certifier
C.
Certifier
Answers
D.
DAA
D.
DAA
Answers
Suggested answer: D

Which of the following rated systems of the Orange book has mandatory protection of the TCB

A.
C-rated
A.
C-rated
Answers
B.
B-rated
B.
B-rated
Answers
C.
D-rated
C.
D-rated
Answers
D.
A-rated
D.
A-rated
Answers
Suggested answer: B

Which of the following categories of system specification describes the technical requirements that cover a service, which is performed on a component of the system

A.
Product specification
A.
Product specification
Answers
B.
Process specification
B.
Process specification
Answers
C.
Material specification
C.
Material specification
Answers
D.
Development specification
D.
Development specification
Answers
Suggested answer: B

Which of the following DITSCAPNIACAP model phases is used to show the required evidence to support the DAA in accreditation process and conclude in an

Approval To Operate (ATO)

A.
Verification
A.
Verification
Answers
B.
Validation
B.
Validation
Answers
C.
Post accreditation
C.
Post accreditation
Answers
D.
Definition
D.
Definition
Answers
Suggested answer: B

Which of the following is a 1996 United States federal law, designed to improve the way the federal government acquires, uses, and disposes information technology

A.
Lanham Act
A.
Lanham Act
Answers
B.
Clinger-Cohen Act
B.
Clinger-Cohen Act
Answers
C.
Computer Misuse Act
C.
Computer Misuse Act
Answers
D.
Paperwork Reduction Act
D.
Paperwork Reduction Act
Answers
Suggested answer: B

An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing Official Each correct answer represents a complete solution.

Choose all that apply.

A.
Ascertaining the security posture of the organization's information system
A.
Ascertaining the security posture of the organization's information system
Answers
B.
Reviewing security status reports and critical security documents
B.
Reviewing security status reports and critical security documents
Answers
C.
Determining the requirement of reauthorization and reauthorizing information systems when required
C.
Determining the requirement of reauthorization and reauthorizing information systems when required
Answers
D.
Establishing and implementing the organization's continuous monitoring program
D.
Establishing and implementing the organization's continuous monitoring program
Answers
Suggested answer: A, B, C

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy

A.
Networks and Infrastructures
A.
Networks and Infrastructures
Answers
B.
Supporting Infrastructures
B.
Supporting Infrastructures
Answers
C.
Enclave Boundaries
C.
Enclave Boundaries
Answers
D.
Local Computing Environments
D.
Local Computing Environments
Answers
Suggested answer: C

Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs

A.
User representative
A.
User representative
Answers
B.
DAA
B.
DAA
Answers
C.
Certification Agent
C.
Certification Agent
Answers
D.
IS program manager
D.
IS program manager
Answers
Suggested answer: D
Total 214 questions
Go to page: of 22