ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199 Each correct answer represents a complete solution. Choose all that apply.

A.
High
A.
High
Answers
B.
Medium
B.
Medium
Answers
C.
Low
C.
Low
Answers
D.
Moderate
D.
Moderate
Answers
Suggested answer: A, B, C

Which of the following federal agencies coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produces foreign intelligence information

A.
National Institute of Standards and Technology (NIST)
A.
National Institute of Standards and Technology (NIST)
Answers
B.
National Security AgencyCentral Security Service (NSACSS)
B.
National Security AgencyCentral Security Service (NSACSS)
Answers
C.
Committee on National Security Systems (CNSS)
C.
Committee on National Security Systems (CNSS)
Answers
D.
United States Congress
D.
United States Congress
Answers
Suggested answer: B

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address

A.
Circuit-level gateway
A.
Circuit-level gateway
Answers
B.
Application gateway
B.
Application gateway
Answers
C.
Proxy server
C.
Proxy server
Answers
D.
Packet Filtering
D.
Packet Filtering
Answers
Suggested answer: D

Which of the following are the subtasks of the Define Life-Cycle Process Concepts task Each correct answer represents a complete solution. Choose all that apply.

A.
Training
A.
Training
Answers
B.
Personnel
B.
Personnel
Answers
C.
Control
C.
Control
Answers
D.
Manpower
D.
Manpower
Answers
Suggested answer: A, B, D

You work as a systems engineer for BlueWell Inc. You want to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Which of the following processes will you use to accomplish the task

A.
Information Assurance (IA)
A.
Information Assurance (IA)
Answers
B.
Risk Management
B.
Risk Management
Answers
C.
Risk Analysis
C.
Risk Analysis
Answers
D.
Information Systems Security Engineering (ISSE)
D.
Information Systems Security Engineering (ISSE)
Answers
Suggested answer: A

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident

A.
Corrective controls
A.
Corrective controls
Answers
B.
Safeguards
B.
Safeguards
Answers
C.
Detective controls
C.
Detective controls
Answers
D.
Preventive controls
D.
Preventive controls
Answers
Suggested answer: A

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability

A.
MAC I
A.
MAC I
Answers
B.
MAC II
B.
MAC II
Answers
C.
MAC III
C.
MAC III
Answers
D.
MAC IV
D.
MAC IV
Answers
Suggested answer: B

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event

A.
Acceptance
A.
Acceptance
Answers
B.
Enhance
B.
Enhance
Answers
C.
Share
C.
Share
Answers
D.
Exploit
D.
Exploit
Answers
Suggested answer: A

You work as a systems engineer for BlueWell Inc. You want to communicate the quantitative and qualitative system characteristics to all stakeholders. Which of the following documents will you use to achieve the above task

A.
IMM
A.
IMM
Answers
B.
CONOPS
B.
CONOPS
Answers
C.
IPP
C.
IPP
Answers
D.
System Security Context
D.
System Security Context
Answers
Suggested answer: B

Which of the following agencies provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations

A.
DARPA
A.
DARPA
Answers
B.
DTIC
B.
DTIC
Answers
C.
DISA
C.
DISA
Answers
D.
DIAP
D.
DIAP
Answers
Suggested answer: C
Total 214 questions
Go to page: of 22