Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

CISSP-ISSEP Sample Questions Answers

Questions 4

Which of the following refers to a process that is used for implementing information security

Options:

A.

Classic information security model

B.

Certification and Accreditation (C&A)

C.

Information Assurance (IA)

D.

Five Pillars model

Buy Now
Questions 5

Your project is an agricultural-based project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit. If your organization seizes this opportunity it would be an example of what risk response

Options:

A.

Enhancing

B.

Positive

C.

Opportunistic

D.

Exploiting

Buy Now
Questions 6

You work as an ISSE for BlueWell Inc. You want to break down user roles, processes, and information until ambiguity is reduced to a satisfactory degree. Which of the following tools will help you to perform the above task

Options:

A.

PERT Chart

B.

Gantt Chart

C.

Functional Flow Block Diagram

D.

Information Management Model (IMM)

Buy Now
Questions 7

TQM recognizes that quality of all the processes within an organization contribute to the quality of the product. Which of the following are the most important activities in the Total Quality Management Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Quality renewal

B.

Maintenance of quality

C.

Quality costs

D.

Quality improvements

Buy Now
Questions 8

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives

Options:

A.

NIST SP 800-53A

B.

NIST SP 800-37

C.

NIST SP 800-53

D.

NIST SP 800-26

E.

NIST SP 800-59

F.

NIST SP 800-60

Buy Now
Questions 9

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors

Options:

A.

Federal Information Processing Standards (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP

Buy Now
Questions 10

Which of the following statements define the role of the ISSEP during the development of the detailed security design, as mentioned in the IATF document Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It identifies the information protection problems that needs to be solved.

B.

It allocates security mechanisms to system security design elements.

C.

It identifies custom security products.

D.

It identifies candidate commercial off-the-shelf (COTS)government off-the-shelf (GOTS) security products.

Buy Now
Questions 11

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system

Options:

A.

System Owner

B.

Information Systems Security Officer (ISSO)

C.

Designated Approving Authority (DAA)

D.

Chief Information Security Officer (CISO)

Buy Now
Questions 12

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems

Options:

A.

Computer Fraud and Abuse Act

B.

Computer Security Act

C.

Gramm-Leach-Bliley Act

D.

Digital Millennium Copyright Act

Buy Now
Questions 13

Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management

Options:

A.

Computer Misuse Act

B.

Clinger-Cohen Act

C.

ISG

D.

Lanham Act

Buy Now
Questions 14

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

Options:

A.

Phase 4

B.

Phase 2

C.

Phase 1

D.

Phase 3

Buy Now
Questions 15

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Develop DIACAP strategy.

B.

Initiate IA implementation plan.

C.

Conduct validation activity.

D.

Assemble DIACAP team.

E.

Register system with DoD Component IA Program.

F.

Assign IA controls.

Buy Now
Questions 16

An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing Official Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ascertaining the security posture of the organization's information system

B.

Reviewing security status reports and critical security documents

C.

Determining the requirement of reauthorization and reauthorizing information systems when required

D.

Establishing and implementing the organization's continuous monitoring program

Buy Now
Questions 17

Fill in the blank with an appropriate phrase. __________ seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes.

Options:

A.

Six Sigma

Buy Now
Questions 18

Which of the following are the subtasks of the Define Life-Cycle Process Concepts task Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Training

B.

Personnel

C.

Control

D.

Manpower

Buy Now
Questions 19

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur

Options:

A.

Continuous Monitoring

B.

Initiation

C.

Security Certification

D.

Security Accreditation

Buy Now
Questions 20

What NIACAP certification levels are recommended by the certifier Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Basic System Review

B.

Basic Security Review

C.

Maximum Analysis

D.

Comprehensive Analysis

E.

Detailed Analysis

F.

Minimum Analysis

Buy Now
Questions 21

Which of the following cooperative programs carried out by NIST encourages performance excellence among U.S. manufacturers, service companies, educational institutions, and healthcare providers

Options:

A.

Manufacturing Extension Partnership

B.

Baldrige National Quality Program

C.

Advanced Technology Program

D.

NIST Laboratories

Buy Now
Questions 22

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

Options:

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Buy Now
Questions 23

Which of the following roles is also known as the accreditor

Options:

A.

Data owner

B.

Chief Information Officer

C.

Chief Risk Officer

D.

Designated Approving Authority

Buy Now
Questions 24

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Regulatory

B.

Advisory

C.

Systematic

D.

Informative

Buy Now
Questions 25

Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Right-Up Approach

B.

Left-Up Approach

C.

Bottom-Up Approach

D.

Top-Down Approach

Buy Now
Questions 26

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle

Options:

A.

Phase 1, Definition

B.

Phase 3, Validation

C.

Phase 4, Post Accreditation Phase

D.

Phase 2, Verification

Buy Now
Questions 27

In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199 Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

High

B.

Medium

C.

Low

D.

Moderate

Buy Now
Questions 28

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DC Security Design & Configuration

B.

EC Enclave and Computing Environment

C.

VI Vulnerability and Incident Management

D.

Information systems acquisition, development, and maintenance

Buy Now
Questions 29

Fill in the blanks with an appropriate phrase. A ________ is an approved build of the product, and can be a single component or a combination of components.

Options:

A.

development baseline

Buy Now
Questions 30

You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process

Options:

A.

Configuration management plan

B.

Transition plan

C.

Systems engineering management plan (SEMP)

D.

Acquisition plan

Buy Now
Questions 31

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

Options:

A.

Type I cryptography

B.

Type II cryptography

C.

Type III (E) cryptography

D.

Type III cryptography

Buy Now
Status:
Expired
Exam Code: CISSP-ISSEP
Exam Name: ISSEP Information Systems Security Engineering Professional
Last Update: Apr 21, 2023
Questions: 212
$72  $159.99
$54  $119.99
$45  $99.99
buy now CISSP-ISSEP