ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems

A.
SSAA
A.
SSAA
Answers
B.
FITSAF
B.
FITSAF
Answers
C.
FIPS
C.
FIPS
Answers
D.
TCSEC
D.
TCSEC
Answers
Suggested answer: A

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using

A.
Risk acceptance
A.
Risk acceptance
Answers
B.
Risk mitigation
B.
Risk mitigation
Answers
C.
Risk avoidance
C.
Risk avoidance
Answers
D.
Risk transfer
D.
Risk transfer
Answers
Suggested answer: D

Which of the following responsibilities are executed by the federal program manager

A.
Ensure justification of expenditures and investment in systems engineering activities.
A.
Ensure justification of expenditures and investment in systems engineering activities.
Answers
B.
Coordinate activities to obtain funding.
B.
Coordinate activities to obtain funding.
Answers
C.
Review project deliverables.
C.
Review project deliverables.
Answers
D.
Review and approve project plans.
D.
Review and approve project plans.
Answers
Suggested answer: A, B, D

Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.

A.
Right-Up Approach
A.
Right-Up Approach
Answers
B.
Left-Up Approach
B.
Left-Up Approach
Answers
C.
Bottom-Up Approach
C.
Bottom-Up Approach
Answers
D.
Top-Down Approach
D.
Top-Down Approach
Answers
Suggested answer: C, D

SIMULATION

Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement (SSAA).

A.
DoDI 5200.40
A.
DoDI 5200.40
Answers
Suggested answer: A

Which of the following acts promote a risk-based policy for cost effective security Each correct answer represents a part of the solution. Choose all that apply.

A.
Clinger-Cohen Act
A.
Clinger-Cohen Act
Answers
B.
Lanham Act
B.
Lanham Act
Answers
C.
Paperwork Reduction Act (PRA)
C.
Paperwork Reduction Act (PRA)
Answers
D.
Computer Misuse Act
D.
Computer Misuse Act
Answers
Suggested answer: A, C

Which of the following tasks prepares the technical management plan in planning the technical effort

A.
Task 10
A.
Task 10
Answers
B.
Task 9
B.
Task 9
Answers
C.
Task 7
C.
Task 7
Answers
D.
Task 8
D.
Task 8
Answers
Suggested answer: B

Which of the following NIST Special Publication documents provides a guideline on network security testing

A.
NIST SP 800-60
A.
NIST SP 800-60
Answers
B.
NIST SP 800-37
B.
NIST SP 800-37
Answers
C.
NIST SP 800-59
C.
NIST SP 800-59
Answers
D.
NIST SP 800-42
D.
NIST SP 800-42
Answers
E.
NIST SP 800-53A
E.
NIST SP 800-53A
Answers
F.
NIST SP 800-53
F.
NIST SP 800-53
Answers
Suggested answer: D

Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary

A.
Registration Task 3
A.
Registration Task 3
Answers
B.
Registration Task 4
B.
Registration Task 4
Answers
C.
Registration Task 2
C.
Registration Task 2
Answers
D.
Registration Task 1
D.
Registration Task 1
Answers
Suggested answer: B

Stella works as a system engineer for BlueWell Inc. She wants to identify the performance thresholds of each build. Which of the following tests will help Stella to achieve her task

A.
Regression test
A.
Regression test
Answers
B.
Reliability test
B.
Reliability test
Answers
C.
Functional test
C.
Functional test
Answers
D.
Performance test
D.
Performance test
Answers
Suggested answer: D
Total 214 questions
Go to page: of 22