Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

ISSEP ISSEP Information Systems Security Engineering Professional Questions and Answers

Questions 4

Lisa is the project manager of the SQL project for her company. She has completed the risk response planning with her project team and is now ready to update the risk register to reflect the risk response. Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created

Options:

A.

The level of detail must define exactly the risk response for each identified risk.

B.

The level of detail is set of project risk governance.

C.

The level of detail is set by historical information.

D.

The level of detail should correspond with the priority ranking.

Buy Now
Questions 5

Fill in the blank with an appropriate phrase. The ______________ process is used for allocating performance and designing the requirements to each function.

Options:

A.

functional allocation

Buy Now
Questions 6

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

Options:

A.

Stateless packet filter firewall

B.

PIX firewall

C.

Stateful packet filter firewall

D.

Virtual firewall

Buy Now
Questions 7

The functional analysis process is used for translating system requirements into detailed function criteria. Which of the following are the elements of functional analysis process Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Model possible overall system behaviors that are needed to achieve the system requirements.

B.

Develop concepts and alternatives that are not technology or component bound.

C.

Decompose functional requirements into discrete tasks or activities, the focus is still on technology not functions or components.

D.

Use a top-down with some bottom-up approach verification.

Buy Now
Questions 8

According to which of the following DoD policies, the implementation of DITSCAP is mandatory for all the systems that process both DoD classified and unclassified information?

Options:

A.

DoD 8500.2

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.1 (IAW)

Buy Now
Questions 9

Which of the following is a type of security management for computers and networks in order to identify security breaches

Options:

A.

IPS

B.

IDS

C.

ASA

D.

EAP

Buy Now
Questions 10

Which of the following refers to a process that is used for implementing information security

Options:

A.

Classic information security model

B.

Certification and Accreditation (C&A)

C.

Information Assurance (IA)

D.

Five Pillars model

Buy Now
Questions 11

Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.

Options:

A.

System Analysis

Buy Now
Questions 12

FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact

Options:

A.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

B.

The loss of confidentiality, integrity, or availability might result in major financial losses.

C.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

D.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

Buy Now
Questions 13

Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system

Options:

A.

Security Control Assessment Task 4

B.

Security Control Assessment Task 3

C.

Security Control Assessment Task 1

D.

Security Control Assessment Task 2

Buy Now
Questions 14

Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

SMIME

C.

TLS

D.

IPSec

Buy Now
Questions 15

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

Options:

A.

NSTISSP No. 7

B.

NSTISSP No. 11

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Buy Now
Questions 16

An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing Official Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ascertaining the security posture of the organization's information system

B.

Reviewing security status reports and critical security documents

C.

Determining the requirement of reauthorization and reauthorizing information systems when required

D.

Establishing and implementing the organization's continuous monitoring program

Buy Now
Questions 17

Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist

Options:

A.

CL 2

B.

CL 3

C.

CL 1

D.

CL 4

Buy Now
Questions 18

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

Options:

A.

Phase 4

B.

Phase 2

C.

Phase 1

D.

Phase 3

Buy Now
Questions 19

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems

Options:

A.

Computer Fraud and Abuse Act

B.

Computer Security Act

C.

Gramm-Leach-Bliley Act

D.

Digital Millennium Copyright Act

Buy Now
Questions 20

Which of the following are the most important tasks of the Information Management Plan (IMP) Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Define the Information Protection Policy (IPP).

B.

Define the System Security Requirements.

C.

Define the mission need.

D.

Identify how the organization manages its information.

Buy Now
Questions 21

Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It performs vulnerabilitythreat analysis assessment.

B.

It provides for entry and storage of individual system data.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Buy Now
Questions 22

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one

Options:

A.

Configuration Item Costing

B.

Configuration Identification

C.

Configuration Verification and Auditing

D.

Configuration Status Accounting

Buy Now
Questions 23

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

Options:

A.

Operational scenarios

B.

Functional requirements

C.

Human factors

D.

Performance requirements

Buy Now
Questions 24

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies

Options:

A.

NSACSS

B.

OMB

C.

DCAA

D.

NIST

Buy Now
Questions 25

Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs

Options:

A.

User representative

B.

DAA

C.

Certification Agent

D.

IS program manager

Buy Now
Questions 26

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Buy Now
Questions 27

The ISSE model adds a security element into each phase of the system life cycle. Choose and reorder the phases of the ISSE model in which they occur.

Options:

A.

Buy Now
Questions 28

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

Options:

A.

Quality Assurance Manager

B.

Senior Analyst

C.

System Owner

D.

Federal program manager

Buy Now
Questions 29

Fill in the blank with an appropriate phrase. A ____________________ is defined as any activity that has an effect on defining, designing, building, or executing a task, requirement, or procedure.

Options:

A.

technical effort

Buy Now
Questions 30

Choose and reorder the steps to built the system security architectures in accordance with the DoDAF.

Options:

A.

Buy Now
Questions 31

Choose and reorder the tasks performed in Plan the effort process.

Options:

A.

Buy Now
Questions 32

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives

Options:

A.

NIST SP 800-53A

B.

NIST SP 800-37

C.

NIST SP 800-53

D.

NIST SP 800-26

E.

NIST SP 800-59

F.

NIST SP 800-60

Buy Now
Exam Code: ISSEP
Exam Name: ISSEP Information Systems Security Engineering Professional
Last Update: May 5, 2024
Questions: 221
ISSEP pdf

ISSEP PDF

$28  $80
ISSEP Engine

ISSEP Testing Engine

$33.25  $95
ISSEP PDF + Engine

ISSEP PDF + Testing Engine

$45.5  $130