CISSP-ISSEP Premium Bundle

CISSP-ISSEP Premium Bundle

Information Systems Security Engineering Professional Certification Exam

4.5 
(45255 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP-ISSEP Free Practice Questions

Cause all that matters here is passing exam with . Cause all that you need is a high score of . The only one thing you need to do is downloading free now. We will not let you down with our money-back guarantee.

Online ISC2 CISSP-ISSEP free dumps demo Below:

NEW QUESTION 1
Which of the following are the phases of the Certification and Accreditation (C&A) process Each correct answer represents a complete solution. Choose two.

  • A. Auditing
  • B. Initiation
  • C. Continuous Monitoring
  • D. Detection

Answer: BC

NEW QUESTION 2
Which of the following federal laws is designed to protect computer data from theft

  • A. Federal Information Security Management Act (FISMA)
  • B. Computer Fraud and Abuse Act (CFAA)
  • C. Government Information Security Reform Act (GISRA)
  • D. Computer Security Act

Answer: B

NEW QUESTION 3
Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network-centric warfare

  • A. DoD 8500.2 Information Assurance Implementation
  • B. DoD 8510.1-M DITSCAP
  • C. DoDI 5200.40
  • D. DoD 8500.1 Information Assurance (IA)

Answer: D

NEW QUESTION 4
You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process

  • A. Design information systems that will meet the certification and accreditation documentation.
  • B. Identify the information protection needs.
  • C. Ensure information systems are designed and developed with functional relevance.
  • D. Instruct systems engineers on availability, integrity, and confidentiality.

Answer: B

NEW QUESTION 5
Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address

  • A. Circuit-level gateway
  • B. Application gateway
  • C. Proxy server
  • D. Packet Filtering

Answer: D

NEW QUESTION 6
Fill in the blanks with an appropriate phrase. A is an approved build of the product, and can be a single component or a combination of components.

  • A. development baseline

Answer: A

NEW QUESTION 7
Stella works as a system engineer for BlueWell Inc. She wants to identify the performance thresholds of each build. Which of the following tests will help Stella to achieve her task

  • A. Regression test
  • B. Reliability test
  • C. Functional test
  • D. Performance test

Answer: D

NEW QUESTION 8
Which of the following phases of NIST SP 800-37 C&A methodology examines the residual risk for acceptability, and prepares the final security accreditation package

  • A. Initiation
  • B. Security Certification
  • C. Continuous Monitoring
  • D. Security Accreditation

Answer: D

NEW QUESTION 9
You work as a systems engineer for BlueWell Inc. You want to communicate the quantitative and qualitative system characteristics to all stakeholders. Which of the following documents will you use to achieve the above task

  • A. IMM
  • B. CONOPS
  • C. IPP
  • D. System Security Context

Answer: B

NEW QUESTION 10
You have been tasked with finding an encryption methodology that will encrypt most types of email attachments. The requirements are that your solution must use the RSA algorithm. Which of the following is your best choice

  • A. PGP
  • B. SMIME
  • C. DES
  • D. Blowfish

Answer: B

NEW QUESTION 11
Fill in the blank with an appropriate phrase. seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes.

  • A. Six Sigma

Answer: A

NEW QUESTION 12
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

  • A. Type I cryptography
  • B. Type II cryptography
  • C. Type III (E) cryptography
  • D. Type III cryptography

Answer: B

NEW QUESTION 13
Which of the following is a type of security management for computers and networks in order to identify security breaches

  • A. IPS
  • B. IDS
  • C. ASA
  • D. EAP

Answer: B

NEW QUESTION 14
Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist

  • A. CL 2
  • B. CL 3
  • C. CL 1
  • D. CL 4

Answer: C

NEW QUESTION 15
Which of the following rated systems of the Orange book has mandatory protection of the TCB

  • A. C-rated
  • B. B-rated
  • C. D-rated
  • D. A-rated

Answer: B

NEW QUESTION 16
Which of the following are the most important tasks of the Information Management Plan (IMP) Each correct answer represents a complete solution. Choose all that apply.

  • A. Define the Information Protection Policy (IPP).
  • B. Define the System Security Requirements.
  • C. Define the mission need.
  • D. Identify how the organization manages its information.

Answer: ACD

100% Valid and Newest Version CISSP-ISSEP Questions & Answers shared by Surepassexam, Get Full Dumps HERE: https://www.surepassexam.com/CISSP-ISSEP-exam-dumps.html (New 213 Q&As)


START CISSP-ISSEP EXAM