Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ISC CISSP-ISSEP ISSEP Information Systems Security Engineering Professional Exam Practice Test

Note! Following CISSP-ISSEP Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 21
Total 213 questions

ISSEP Information Systems Security Engineering Professional Questions and Answers

Question 1

Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States

Options:

A.

Lanham Act

B.

FISMA

C.

Computer Fraud and Abuse Act

D.

Computer Misuse Act

Question 2

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

Options:

A.

Risk management plan

B.

Project charter

C.

Quality management plan

D.

Risk register

Question 3

Which of the following responsibilities are executed by the federal program manager

Options:

A.

Ensure justification of expenditures and investment in systems engineering activities.

B.

Coordinate activities to obtain funding.

C.

Review project deliverables.

D.

Review and approve project plans.

Question 4

Which of the following phases of the ISSE model is used to determine why the system needs to be built and what information needs to be protected

Options:

A.

Develop detailed security design

B.

Define system security requirements

C.

Discover information protection needs

D.

Define system security architecture

Question 5

Which of the following agencies provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations

Options:

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Question 6

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The degree to which the security of the system, as it is defined, designed, and implemented, meets the security needs.

B.

The problem space is defined by the customer's mission or business needs.

C.

The systems engineer and information systems security engineer define the solution space, which is driven by the problem space.

D.

Always keep the problem and solution spaces separate.

Question 7

Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs

Options:

A.

User representative

B.

DAA

C.

Certification Agent

D.

IS program manager

Question 8

Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

Options:

A.

functional analysis

Question 9

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Type accreditation

B.

Site accreditation

C.

System accreditation

D.

Secure accreditation

Question 10

Which of the following terms describes the measures that protect and support information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Options:

A.

Information Systems Security Engineering (ISSE)

B.

Information Protection Policy (IPP)

C.

Information systems security (InfoSec)

D.

Information Assurance (IA)

Question 11

FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact

Options:

A.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

B.

The loss of confidentiality, integrity, or availability might result in major financial losses.

C.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

D.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

Question 12

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

Options:

A.

NSTISSP No. 7

B.

NSTISSP No. 11

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Question 13

Fill in the blanks with an appropriate phrase. A ________ is an approved build of the product, and can be a single component or a combination of components.

Options:

A.

development baseline

Question 14

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing Standard

Options:

A.

Type III (E) cryptography

B.

Type III cryptography

C.

Type I cryptography

D.

Type II cryptography

Question 15

Which of the following is a 1996 United States federal law, designed to improve the way the federal government acquires, uses, and disposes information technology

Options:

A.

Lanham Act

B.

Clinger-Cohen Act

C.

Computer Misuse Act

D.

Paperwork Reduction Act

Question 16

Which of the following tools demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators

Options:

A.

ISO 90012000

B.

Benchmarking

C.

SEI-CMM

D.

Six Sigma

Question 17

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Requested changes

D.

Qualitative risk analysis

Question 18

Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process USG classified information

Options:

A.

NSTISSP No. 11

B.

NSTISSP No. 101

C.

NSTISSP No. 7

D.

NSTISSP No. 6

Question 19

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart

Options:

A.

Risk response plan

B.

Quantitative analysis

C.

Risk response

D.

Contingency reserve

Question 20

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense

Options:

A.

DoD 5200.22-M

B.

DoD 8910.1

C.

DoD 5200.40

D.

DoD 8000.1

Question 21

Fill in the blank with an appropriate phrase. The ______________ process is used for allocating performance and designing the requirements to each function.

Options:

A.

functional allocation

Question 22

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

Options:

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Question 23

Which of the following DITSCAPNIACAP model phases is used to show the required evidence to support the DAA in accreditation process and conclude in an Approval To Operate (ATO)

Options:

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Question 24

The phase 3 of the Risk Management Framework (RMF) process is known as mitigation planning. Which of the following processes take place in phase 3 Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Agree on a strategy to mitigate risks.

B.

Evaluate mitigation progress and plan next assessment.

C.

Identify threats, vulnerabilities, and controls that will be evaluated.

D.

Document and implement a mitigation plan.

Question 25

Which of the following acts assigns the Chief Information Officers (CIO) with the responsibility to develop Information Technology Architectures (ITAs) and is also referred to as the Information Technology Management Reform Act (ITMRA)

Options:

A.

Paperwork Reduction Act

B.

Computer Misuse Act

C.

Lanham Act

D.

Clinger Cohen Act

Question 26

Which of the following are the phases of the Certification and Accreditation (C&A) process Each correct answer represents a complete solution. Choose two.

Options:

A.

Auditing

B.

Initiation

C.

Continuous Monitoring

D.

Detection

Question 27

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Assessment of the Analysis Results

B.

Certification analysis

C.

Registration

D.

System development

E.

Configuring refinement of the SSAA

Question 28

Which of the following organizations is a USG initiative designed to meet the security testing, evaluation, and assessment needs of both information technology (IT) producers and consumers

Options:

A.

NSA

B.

NIST

C.

CNSS

D.

NIAP

Question 29

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

Options:

A.

Certification and accreditation (C&A)

B.

Risk Management

C.

Information systems security engineering (ISSE)

D.

Information Assurance (IA)

Question 30

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems

Options:

A.

Computer Fraud and Abuse Act

B.

Computer Security Act

C.

Gramm-Leach-Bliley Act

D.

Digital Millennium Copyright Act

Question 31

Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities

Options:

A.

Advisory memoranda

B.

Directives

C.

Instructions

D.

Policies

Page: 1 / 21
Total 213 questions