ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











You work as a security engineer for BlueWell Inc. You are working on the ISSE model. In which of the following phases of the ISSE model is the system defined in terms of what security is needed

A.
Define system security architecture
A.
Define system security architecture
Answers
B.
Develop detailed security design
B.
Develop detailed security design
Answers
C.
Discover information protection needs
C.
Discover information protection needs
Answers
D.
Define system security requirements
D.
Define system security requirements
Answers
Suggested answer: D

TQM recognizes that quality of all the processes within an organization contribute to the quality of the product. Which of the following are the most important activities in the Total Quality Management Each correct answer represents a complete solution. Choose all that apply.

A.
Quality renewal
A.
Quality renewal
Answers
B.
Maintenance of quality
B.
Maintenance of quality
Answers
C.
Quality costs
C.
Quality costs
Answers
D.
Quality improvements
D.
Quality improvements
Answers
Suggested answer: A, B, D

SIMULATION

Fill in the blank with the appropriate phrase. The ____________ is the risk that remains after the implementation of new or enhanced controls.

A.
residual risk
A.
residual risk
Answers
Suggested answer: A

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

A.
DAS
A.
DAS
Answers
B.
IDS
B.
IDS
Answers
C.
ACL
C.
ACL
Answers
D.
Ipsec
D.
Ipsec
Answers
Suggested answer: B

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

A.
Internet Key Exchange (IKE) Protocol
A.
Internet Key Exchange (IKE) Protocol
Answers
B.
SMIME
B.
SMIME
Answers
C.
Internet Protocol Security (IPSec)
C.
Internet Protocol Security (IPSec)
Answers
D.
Secure Socket Layer (SSL)
D.
Secure Socket Layer (SSL)
Answers
Suggested answer: C

Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks

A.
DoD 8500.1 Information Assurance (IA)
A.
DoD 8500.1 Information Assurance (IA)
Answers
B.
DoDI 5200.40
B.
DoDI 5200.40
Answers
C.
DoD 8510.1-M DITSCAP
C.
DoD 8510.1-M DITSCAP
Answers
D.
DoD 8500.2 Information Assurance Implementation
D.
DoD 8500.2 Information Assurance Implementation
Answers
Suggested answer: D

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

A.
FIPS 200
A.
FIPS 200
Answers
B.
NIST SP 800-50
B.
NIST SP 800-50
Answers
C.
Traceability matrix
C.
Traceability matrix
Answers
D.
FIPS 199
D.
FIPS 199
Answers
Suggested answer: C

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution. Choose all that apply.

A.
An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
A.
An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
Answers
B.
An ISSE provides advice on the impacts of system changes.
B.
An ISSE provides advice on the impacts of system changes.
Answers
C.
An ISSE provides advice on the continuous monitoring of the information system.
C.
An ISSE provides advice on the continuous monitoring of the information system.
Answers
D.
An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
D.
An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
Answers
E.
An ISSO takes part in the development activities that are required to implement system changes.
E.
An ISSO takes part in the development activities that are required to implement system changes.
Answers
Suggested answer: B, C, D

SIMULATION

For interactive and self-paced preparation of exam ISSEP, try our practice exams.

Practice exams also include self assessment and reporting features!

Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

A.
Netcentric
A.
Netcentric
Answers
Suggested answer: A

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available

A.
Configuration Identification
A.
Configuration Identification
Answers
B.
Configuration Verification and Audit
B.
Configuration Verification and Audit
Answers
C.
Configuration Status and Accounting
C.
Configuration Status and Accounting
Answers
D.
Configuration Control
D.
Configuration Control
Answers
Suggested answer: C
Total 214 questions
Go to page: of 22