ExamGecko
Home Home / ISC / CISSP-ISSEP

ISC CISSP-ISSEP Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











Which of the following cooperative programs carried out by NIST encourages performance excellence among U.S. manufacturers, service companies, educational institutions, and healthcare providers

A.
Manufacturing Extension Partnership
A.
Manufacturing Extension Partnership
Answers
B.
Baldrige National Quality Program
B.
Baldrige National Quality Program
Answers
C.
Advanced Technology Program
C.
Advanced Technology Program
Answers
D.
NIST Laboratories
D.
NIST Laboratories
Answers
Suggested answer: B

Your project is an agricultural-based project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit. If your organization seizes this opportunity it would be an example of what risk response

A.
Enhancing
A.
Enhancing
Answers
B.
Positive
B.
Positive
Answers
C.
Opportunistic
C.
Opportunistic
Answers
D.
Exploiting
D.
Exploiting
Answers
Suggested answer: D

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

A.
Operational scenarios
A.
Operational scenarios
Answers
B.
Functional requirements
B.
Functional requirements
Answers
C.
Human factors
C.
Human factors
Answers
D.
Performance requirements
D.
Performance requirements
Answers
Suggested answer: A

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment? Each correct answer represents a part of the solution. Choose all that apply.

A.
Information Assurance Manager
A.
Information Assurance Manager
Answers
B.
Designated Approving Authority
B.
Designated Approving Authority
Answers
C.
Certification agent
C.
Certification agent
Answers
D.
IS program manager
D.
IS program manager
Answers
E.
User representative
E.
User representative
Answers
Suggested answer: B, C, D, E

Which of the following is NOT used in the practice of Information Assurance (IA) to define assurance requirements

A.
Classic information security model
A.
Classic information security model
Answers
B.
Five Pillars model
B.
Five Pillars model
Answers
C.
Communications Management Plan
C.
Communications Management Plan
Answers
D.
Parkerian Hexad
D.
Parkerian Hexad
Answers
Suggested answer: C

Which of the following NIST documents describes that minimizing negative impact on an organization and a need for sound basis in decision making are the fundamental reasons organizations implement a risk management process for their IT systems

A.
NIST SP 800-37
A.
NIST SP 800-37
Answers
B.
NIST SP 800-30
B.
NIST SP 800-30
Answers
C.
NIST SP 800-53
C.
NIST SP 800-53
Answers
D.
NIST SP 800-60
D.
NIST SP 800-60
Answers
Suggested answer: B

Which of the following roles is also known as the accreditor

A.
Data owner
A.
Data owner
Answers
B.
Chief Information Officer
B.
Chief Information Officer
Answers
C.
Chief Risk Officer
C.
Chief Risk Officer
Answers
D.
Designated Approving Authority
D.
Designated Approving Authority
Answers
Suggested answer: D

In which of the following DIACAP phases is residual risk analyzed

A.
Phase 2
A.
Phase 2
Answers
B.
Phase 3
B.
Phase 3
Answers
C.
Phase 5
C.
Phase 5
Answers
D.
Phase 1
D.
Phase 1
Answers
E.
Phase 4
E.
Phase 4
Answers
Suggested answer: E

Which of the following CNSS policies describes the national policy on controlled access protection

A.
NSTISSP No. 101
A.
NSTISSP No. 101
Answers
B.
NSTISSP No. 200
B.
NSTISSP No. 200
Answers
C.
NCSC No. 5
C.
NCSC No. 5
Answers
D.
CNSSP No. 14
D.
CNSSP No. 14
Answers
Suggested answer: B

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS

A.
DARPA
A.
DARPA
Answers
B.
DTIC
B.
DTIC
Answers
C.
DISA
C.
DISA
Answers
D.
DIAP
D.
DIAP
Answers
Suggested answer: A
Total 214 questions
Go to page: of 22