ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

A.
Develop DIACAP strategy.
A.
Develop DIACAP strategy.
Answers
B.
Initiate IA implementation plan.
B.
Initiate IA implementation plan.
Answers
C.
Conduct validation activity.
C.
Conduct validation activity.
Answers
D.
Assemble DIACAP team.
D.
Assemble DIACAP team.
Answers
E.
Register system with DoD Component IA Program.
E.
Register system with DoD Component IA Program.
Answers
F.
Assign IA controls.
F.
Assign IA controls.
Answers
Suggested answer: A, B, D, E, F

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of

Federal Information Systems

A.
NIST Special Publication 800-59
A.
NIST Special Publication 800-59
Answers
B.
NIST Special Publication 800-37
B.
NIST Special Publication 800-37
Answers
C.
NIST Special Publication 800-60
C.
NIST Special Publication 800-60
Answers
D.
NIST Special Publication 800-53
D.
NIST Special Publication 800-53
Answers
Suggested answer: B

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

A.
Risk management plan
A.
Risk management plan
Answers
B.
Project charter
B.
Project charter
Answers
C.
Quality management plan
C.
Quality management plan
Answers
D.
Risk register
D.
Risk register
Answers
Suggested answer: D

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response

A.
Project sponsor
A.
Project sponsor
Answers
B.
Risk owner
B.
Risk owner
Answers
C.
Diane
C.
Diane
Answers
D.
Subject matter expert
D.
Subject matter expert
Answers
Suggested answer: B

Which of the following refers to a process that is used for implementing information security

A.
Classic information security model
A.
Classic information security model
Answers
B.
Certification and Accreditation (C&A)
B.
Certification and Accreditation (C&A)
Answers
C.
Information Assurance (IA)
C.
Information Assurance (IA)
Answers
D.
Five Pillars model
D.
Five Pillars model
Answers
Suggested answer: B

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47, do the organizations build and execute a plan for establishing the interconnection, including executing or configuring appropriate security controls

A.
Establishing the interconnection
A.
Establishing the interconnection
Answers
B.
Planning the interconnection
B.
Planning the interconnection
Answers
C.
Disconnecting the interconnection
C.
Disconnecting the interconnection
Answers
D.
Maintaining the interconnection
D.
Maintaining the interconnection
Answers
Suggested answer: A

Which of the following tools demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators

A.
ISO 90012000
A.
ISO 90012000
Answers
B.
Benchmarking
B.
Benchmarking
Answers
C.
SEI-CMM
C.
SEI-CMM
Answers
D.
Six Sigma
D.
Six Sigma
Answers
Suggested answer: A

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats

A.
System Security Context
A.
System Security Context
Answers
B.
Information Protection Policy (IPP)
B.
Information Protection Policy (IPP)
Answers
C.
CONOPS
C.
CONOPS
Answers
D.
IMM
D.
IMM
Answers
Suggested answer: B

Which of the following statements define the role of the ISSEP during the development of the detailed security design, as mentioned in the IATF document Each correct answer represents a complete solution. Choose all that apply.

A.
It identifies the information protection problems that needs to be solved.
A.
It identifies the information protection problems that needs to be solved.
Answers
B.
It allocates security mechanisms to system security design elements.
B.
It allocates security mechanisms to system security design elements.
Answers
C.
It identifies custom security products.
C.
It identifies custom security products.
Answers
D.
It identifies candidate commercial off-the-shelf (COTS)government off-the-shelf (GOTS) security products.
D.
It identifies candidate commercial off-the-shelf (COTS)government off-the-shelf (GOTS) security products.
Answers
Suggested answer: B, C, D

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

A.
Quality Assurance Manager
A.
Quality Assurance Manager
Answers
B.
Senior Analyst
B.
Senior Analyst
Answers
C.
System Owner
C.
System Owner
Answers
D.
Federal program manager
D.
Federal program manager
Answers
Suggested answer: D
Total 214 questions
Go to page: of 22