ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Question 201

Report
Export
Collapse

Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network-centric warfare

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 202

Report
Export
Collapse

Which of the following are the functional analysis and allocation tools Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 203

Report
Export
Collapse

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing

Standard

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 204

Report
Export
Collapse

Which of the following are the benefits of SE as stated by MIL-STD-499B Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 205

Report
Export
Collapse

Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production Each correct answer represents a part of the solution.

Choose all that apply.

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 206

Report
Export
Collapse

John works as a security engineer for BlueWell Inc. He wants to identify the different functions that the system will need to perform to meet the documented missionbusiness needs. Which of the following processes will John use to achieve the task

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 207

Report
Export
Collapse

Registration Task 5 identifies the system security requirements. Which of the following elements of Registration Task 5 defines the type of data processed by the system

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 208

Report
Export
Collapse

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 209

Report
Export
Collapse

Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 210

Report
Export
Collapse

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 214 questions
Go to page: of 22