ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Which of the following memorandums reminds the Federal agencies that it is required by law and policy to establish clear privacy policies for Web activities and to comply with those policies

A.
OMB M-01-08
A.
OMB M-01-08
Answers
B.
OMB M-03-19
B.
OMB M-03-19
Answers
C.
OMB M-00-07
C.
OMB M-00-07
Answers
D.
OMB M-00-13
D.
OMB M-00-13
Answers
Suggested answer: D

Lisa is the project manager of the SQL project for her company. She has completed the risk response planning with her project team and is now ready to update the risk register to reflect the risk response. Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created

A.
The level of detail must define exactly the risk response for each identified risk.
A.
The level of detail must define exactly the risk response for each identified risk.
Answers
B.
The level of detail is set of project risk governance.
B.
The level of detail is set of project risk governance.
Answers
C.
The level of detail is set by historical information.
C.
The level of detail is set by historical information.
Answers
D.
The level of detail should correspond with the priority ranking.
D.
The level of detail should correspond with the priority ranking.
Answers
Suggested answer: D

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur

A.
Continuous Monitoring
A.
Continuous Monitoring
Answers
B.
Initiation
B.
Initiation
Answers
C.
Security Certification
C.
Security Certification
Answers
D.
Security Accreditation
D.
Security Accreditation
Answers
Suggested answer: B

You work as a systems engineer for BlueWell Inc. You are working on translating system requirements into detailed function criteria. Which of the following diagrams will help you to show all of the function requirements and their groupings in one diagram

A.
Activity diagram
A.
Activity diagram
Answers
B.
Functional flow block diagram (FFBD)
B.
Functional flow block diagram (FFBD)
Answers
C.
Functional hierarchy diagram
C.
Functional hierarchy diagram
Answers
D.
Timeline analysis diagram
D.
Timeline analysis diagram
Answers
Suggested answer: C

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle

A.
Phase 1, Definition
A.
Phase 1, Definition
Answers
B.
Phase 3, Validation
B.
Phase 3, Validation
Answers
C.
Phase 4, Post Accreditation Phase
C.
Phase 4, Post Accreditation Phase
Answers
D.
Phase 2, Verification
D.
Phase 2, Verification
Answers
Suggested answer: C

Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developed

A.
Security Control Assessment Task 3
A.
Security Control Assessment Task 3
Answers
B.
Security Control Assessment Task 1
B.
Security Control Assessment Task 1
Answers
C.
Security Control Assessment Task 4
C.
Security Control Assessment Task 4
Answers
D.
Security Control Assessment Task 2
D.
Security Control Assessment Task 2
Answers
Suggested answer: A

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation.

What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.

A.
Assessment of the Analysis Results
A.
Assessment of the Analysis Results
Answers
B.
Certification analysis
B.
Certification analysis
Answers
C.
Registration
C.
Registration
Answers
D.
System development
D.
System development
Answers
E.
Configuring refinement of the SSAA
E.
Configuring refinement of the SSAA
Answers
Suggested answer: A, B, D, E

You work as a Network Administrator for PassGuide Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security

A.
HTTP
A.
HTTP
Answers
B.
VPN
B.
VPN
Answers
C.
SMIME
C.
SMIME
Answers
D.
SSL
D.
SSL
Answers
Suggested answer: D

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by

NIST for external sponsors, including government and non-government sponsors

A.
Federal Information Processing Standards (FIPS)
A.
Federal Information Processing Standards (FIPS)
Answers
B.
Special Publication (SP)
B.
Special Publication (SP)
Answers
C.
NISTIRs (Internal Reports)
C.
NISTIRs (Internal Reports)
Answers
D.
DIACAP
D.
DIACAP
Answers
Suggested answer: C

SIMULATION Fill in the blank with an appropriate phrase. __________ seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes.

A.
Six Sigma
A.
Six Sigma
Answers
Suggested answer: A
Total 214 questions
Go to page: of 22