CISSP-ISSEP Premium Bundle

CISSP-ISSEP Premium Bundle

Information Systems Security Engineering Professional Certification Exam

4.5 
(45270 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP-ISSEP Free Practice Questions

It is impossible to pass ISC2 CISSP-ISSEP exam without any help in the short term. Come to us soon and find the most advanced, correct and guaranteed . You will get a surprising result by our .

Check CISSP-ISSEP free dumps before getting the full version:

NEW QUESTION 1
Which of the following DITSCAPNIACAP model phases is used to show the required evidence to support the DAA in accreditation process and conclude in an Approval To Operate (ATO)

  • A. Verification
  • B. Validation
  • C. Post accreditation
  • D. Definition

Answer: B

NEW QUESTION 2
Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available

  • A. Configuration Identification
  • B. Configuration Verification and Audit
  • C. Configuration Status and Accounting
  • D. Configuration Control

Answer: C

NEW QUESTION 3
Which of the following types of CNSS issuances describes how to implement the policy or prescribes the manner of a policy

  • A. Advisory memoranda
  • B. Instructions
  • C. Policies
  • D. Directives

Answer: B

NEW QUESTION 4
Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

  • A. Certification and accreditation (C&A)
  • B. Risk Management
  • C. Information systems security engineering (ISSE)
  • D. Information Assurance (IA)

Answer: A

NEW QUESTION 5
Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

  • A. National Institute of Standards and Technology (NIST)
  • B. National Security Agency (NSA)
  • C. Committee on National Security Systems (CNSS)
  • D. United States Congress

Answer: A

NEW QUESTION 6
Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality

  • A. Information Protection Policy (IPP)
  • B. IMM
  • C. System Security Context
  • D. CONOPS

Answer: A

NEW QUESTION 7
Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives

  • A. NIST SP 800-53A
  • B. NIST SP 800-37
  • C. NIST SP 800-53
  • D. NIST SP 800-26
  • E. NIST SP 800-59
  • F. NIST SP 800-60

Answer: D

NEW QUESTION 8
In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47, do the organizations build and execute a plan for establishing the interconnection, including executing or configuring appropriate security controls

  • A. Establishing the interconnection
  • B. Planning the interconnection
  • C. Disconnecting the interconnection
  • D. Maintaining the interconnection

Answer: A

NEW QUESTION 9
Which of the following memorandums reminds the Federal agencies that it is required by law and policy to establish clear privacy policies for Web activities and to comply with those policies

  • A. OMB M-01-08
  • B. OMB M-03-19
  • C. OMB M-00-07
  • D. OMB M-00-13

Answer: D

NEW QUESTION 10
Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary

  • A. Registration Task 3
  • B. Registration Task 4
  • C. Registration Task 2
  • D. Registration Task 1

Answer: B

NEW QUESTION 11
Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it

  • A. OMB M-99-18
  • B. OMB M-00-13
  • C. OMB M-03-19
  • D. OMB M-00-07

Answer: A

NEW QUESTION 12
Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

  • A. Information Assurance (IA)
  • B. Information Systems Security Engineering (ISSE)
  • C. Information Protection Policy (IPP)
  • D. Information systems security (InfoSec)

Answer: D

NEW QUESTION 13
Fill in the blank with an appropriate phrase. A is defined as any activity that has an effect on defining, designing, building, or executing a task, requirement, or procedure.

  • A. technical effort

Answer: A

NEW QUESTION 14
Which of the following is the acronym of RTM

  • A. Resource tracking method
  • B. Requirements Testing Matrix
  • C. Requirements Traceability Matrix
  • D. Resource timing method

Answer: C

NEW QUESTION 15
Which of the following CNSS policies describes the national policy on securing voice communications

  • A. NSTISSP N
  • B. 6
  • C. NSTISSP N
  • D. 7
  • E. NSTISSP N
  • F. 101
  • G. NSTISSP N
  • H. 200

Answer: C

NEW QUESTION 16
Which of the following is NOT an objective of the security program

  • A. Security education
  • B. Information classification
  • C. Security organization
  • D. Security plan

Answer: D

P.S. Surepassexam now are offering 100% pass ensure CISSP-ISSEP dumps! All CISSP-ISSEP exam questions have been updated with correct answers: https://www.surepassexam.com/CISSP-ISSEP-exam-dumps.html (213 New Questions)


START CISSP-ISSEP EXAM