ExamGecko
Home / ISC / CISSP-ISSEP / List of questions
Ask Question

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

You work as a security engineer for BlueWell Inc. You are working on the ISSE model. In which of the following phases of the ISSE model is the system defined in terms of what security is needed

Define system security architecture
Define system security architecture
Develop detailed security design
Develop detailed security design
Discover information protection needs
Discover information protection needs
Define system security requirements
Define system security requirements
Suggested answer: D
asked 18/09/2024
Trung Phan
52 questions

Question 62

Report Export Collapse

TQM recognizes that quality of all the processes within an organization contribute to the quality of the product. Which of the following are the most important activities in the Total Quality Management Each correct answer represents a complete solution. Choose all that apply.

Quality renewal
Quality renewal
Maintenance of quality
Maintenance of quality
Quality costs
Quality costs
Quality improvements
Quality improvements
Suggested answer: A, B, D
asked 18/09/2024
Ramzi Smair
39 questions

Question 63

Report Export Collapse

SIMULATION

Fill in the blank with the appropriate phrase. The ____________ is the risk that remains after the implementation of new or enhanced controls.

residual risk
residual risk
Suggested answer: A
asked 18/09/2024
Wilson Geneblazo
36 questions

Question 64

Report Export Collapse

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

DAS
DAS
IDS
IDS
ACL
ACL
Ipsec
Ipsec
Suggested answer: B
asked 18/09/2024
Reatlehile Motaung
30 questions

Question 65

Report Export Collapse

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

Internet Key Exchange (IKE) Protocol
Internet Key Exchange (IKE) Protocol
SMIME
SMIME
Internet Protocol Security (IPSec)
Internet Protocol Security (IPSec)
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Suggested answer: C
asked 18/09/2024
Ghazi Khan
28 questions

Question 66

Report Export Collapse

Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks

DoD 8500.1 Information Assurance (IA)
DoD 8500.1 Information Assurance (IA)
DoDI 5200.40
DoDI 5200.40
DoD 8510.1-M DITSCAP
DoD 8510.1-M DITSCAP
DoD 8500.2 Information Assurance Implementation
DoD 8500.2 Information Assurance Implementation
Suggested answer: D
asked 18/09/2024
asia Mattaccini
46 questions

Question 67

Report Export Collapse

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

FIPS 200
FIPS 200
NIST SP 800-50
NIST SP 800-50
Traceability matrix
Traceability matrix
FIPS 199
FIPS 199
Suggested answer: C
asked 18/09/2024
Herlinda Cantu
48 questions

Question 68

Report Export Collapse

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution. Choose all that apply.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
An ISSE provides advice on the impacts of system changes.
An ISSE provides advice on the impacts of system changes.
An ISSE provides advice on the continuous monitoring of the information system.
An ISSE provides advice on the continuous monitoring of the information system.
An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
An ISSO takes part in the development activities that are required to implement system changes.
An ISSO takes part in the development activities that are required to implement system changes.
Suggested answer: B, C, D
asked 18/09/2024
Adrien BARDE
35 questions

Question 69

Report Export Collapse

SIMULATION

For interactive and self-paced preparation of exam ISSEP, try our practice exams.

Practice exams also include self assessment and reporting features!

Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

Netcentric
Netcentric
Suggested answer: A
asked 18/09/2024
leconte maxime
41 questions

Question 70

Report Export Collapse

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available

Configuration Identification
Configuration Identification
Configuration Verification and Audit
Configuration Verification and Audit
Configuration Status and Accounting
Configuration Status and Accounting
Configuration Control
Configuration Control
Suggested answer: C
asked 18/09/2024
Eduardo Bravo
42 questions
Total 214 questions
Go to page: of 22
Search

Related questions