ExamGecko
Home / ISC / CISSP-ISSEP / List of questions
Ask Question

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

Develop DIACAP strategy.
Develop DIACAP strategy.
Initiate IA implementation plan.
Initiate IA implementation plan.
Conduct validation activity.
Conduct validation activity.
Assemble DIACAP team.
Assemble DIACAP team.
Register system with DoD Component IA Program.
Register system with DoD Component IA Program.
Assign IA controls.
Assign IA controls.
Suggested answer: A, B, D, E, F
asked 18/09/2024
Arash Rind
50 questions

Question 32

Report Export Collapse

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of

Federal Information Systems

NIST Special Publication 800-59
NIST Special Publication 800-59
NIST Special Publication 800-37
NIST Special Publication 800-37
NIST Special Publication 800-60
NIST Special Publication 800-60
NIST Special Publication 800-53
NIST Special Publication 800-53
Suggested answer: B
asked 18/09/2024
Matthew Farrington
40 questions

Question 33

Report Export Collapse

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

Risk management plan
Risk management plan
Project charter
Project charter
Quality management plan
Quality management plan
Risk register
Risk register
Suggested answer: D
asked 18/09/2024
hotthefish shark
39 questions

Question 34

Report Export Collapse

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response

Project sponsor
Project sponsor
Risk owner
Risk owner
Diane
Diane
Subject matter expert
Subject matter expert
Suggested answer: B
asked 18/09/2024
metodija durtanoski
45 questions

Question 35

Report Export Collapse

Which of the following refers to a process that is used for implementing information security

Classic information security model
Classic information security model
Certification and Accreditation (C&A)
Certification and Accreditation (C&A)
Information Assurance (IA)
Information Assurance (IA)
Five Pillars model
Five Pillars model
Suggested answer: B
asked 18/09/2024
monet washington
42 questions

Question 36

Report Export Collapse

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47, do the organizations build and execute a plan for establishing the interconnection, including executing or configuring appropriate security controls

Establishing the interconnection
Establishing the interconnection
Planning the interconnection
Planning the interconnection
Disconnecting the interconnection
Disconnecting the interconnection
Maintaining the interconnection
Maintaining the interconnection
Suggested answer: A
asked 18/09/2024
Darren Bajada
52 questions

Question 37

Report Export Collapse

Which of the following tools demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators

ISO 90012000
ISO 90012000
Benchmarking
Benchmarking
SEI-CMM
SEI-CMM
Six Sigma
Six Sigma
Suggested answer: A
asked 18/09/2024
Jordi Nogues
40 questions

Question 38

Report Export Collapse

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats

System Security Context
System Security Context
Information Protection Policy (IPP)
Information Protection Policy (IPP)
CONOPS
CONOPS
IMM
IMM
Suggested answer: B
asked 18/09/2024
Victor Cantu
42 questions

Question 39

Report Export Collapse

Which of the following statements define the role of the ISSEP during the development of the detailed security design, as mentioned in the IATF document Each correct answer represents a complete solution. Choose all that apply.

It identifies the information protection problems that needs to be solved.
It identifies the information protection problems that needs to be solved.
It allocates security mechanisms to system security design elements.
It allocates security mechanisms to system security design elements.
It identifies custom security products.
It identifies custom security products.
It identifies candidate commercial off-the-shelf (COTS)government off-the-shelf (GOTS) security products.
It identifies candidate commercial off-the-shelf (COTS)government off-the-shelf (GOTS) security products.
Suggested answer: B, C, D
asked 18/09/2024
Daniel Ramirez
52 questions

Question 40

Report Export Collapse

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

Quality Assurance Manager
Quality Assurance Manager
Senior Analyst
Senior Analyst
System Owner
System Owner
Federal program manager
Federal program manager
Suggested answer: D
asked 18/09/2024
Arnab Gupta
46 questions
Total 214 questions
Go to page: of 22
Search

Related questions