ISC CISSP-ISSEP Practice Test - Questions Answers, Page 3
List of questions
Related questions
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability
What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.
Which of the following Registration Tasks sets up the business or operational functional description and system identification
SIMULATION
Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.
Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems
Which of the following statements is true about residual risks
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.
Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution. Choose two.
Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet
Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented
Question