Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium ISC CISSP-ISSEP Dumps Questions Answers

Page: 1 / 8
Total 213 questions

ISSEP Information Systems Security Engineering Professional Questions and Answers

Question 1

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47, do the organizations build and execute a plan for establishing the interconnection, including executing or configuring appropriate security controls

Options:

A.

Establishing the interconnection

B.

Planning the interconnection

C.

Disconnecting the interconnection

D.

Maintaining the interconnection

Buy Now
Question 2

Which of the following is the acronym of RTM

Options:

A.

Resource tracking method

B.

Requirements Testing Matrix

C.

Requirements Traceability Matrix

D.

Resource timing method

Question 3

Fill in the blanks with an appropriate phrase. A ________ is an approved build of the product, and can be a single component or a combination of components.

Options:

A.

development baseline

Question 4

Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

Options:

A.

Information Assurance (IA)

B.

Information Systems Security Engineering (ISSE)

C.

Information Protection Policy (IPP)

D.

Information systems security (InfoSec)

Question 5

Which of the following rated systems of the Orange book has mandatory protection of the TCB

Options:

A.

C-rated

B.

B-rated

C.

D-rated

D.

A-rated

Question 6

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality

Options:

A.

Information Protection Policy (IPP)

B.

IMM

C.

System Security Context

D.

CONOPS

Question 7

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Question 8

For interactive and self-paced preparation of exam ISSEP, try our practice exams.

Practice exams also include self assessment and reporting features!

Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

Options:

A.

Netcentric

Question 9

According to which of the following DoD policies, the implementation of DITSCAP is mandatory for all the systems that process both DoD classified and unclassified information?

Options:

A.

DoD 8500.2

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.1 (IAW)

Question 10

Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it

Options:

A.

OMB M-99-18

B.

OMB M-00-13

C.

OMB M-03-19

D.

OMB M-00-07

Question 11

You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process

Options:

A.

Configuration management plan

B.

Transition plan

C.

Systems engineering management plan (SEMP)

D.

Acquisition plan

Question 12

Which of the following are the subtasks of the Define Life-Cycle Process Concepts task Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Training

B.

Personnel

C.

Control

D.

Manpower

Question 13

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system

Options:

A.

SSAA

B.

TCSEC

C.

FIPS

D.

FITSAF

Question 14

Which of the following CNSS policies describes the national policy on use of cryptomaterial by activities operating in high risk environments

Options:

A.

CNSSP No. 14

B.

NCSC No. 5

C.

NSTISSP No. 6

D.

NSTISSP No. 7

Question 15

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

Options:

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Question 16

Which of the of following departments protects and supports DoD information, information systems, and information networks that are critical to the department and the armed forces during the day-to-day operations, and in the time of crisis

Options:

A.

DIAP

B.

DARPA

C.

DTIC

D.

DISA

Question 17

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

Options:

A.

ATM

B.

RTM

C.

CRO

D.

DAA

Question 18

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution. Choose two.

Options:

A.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

C.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

D.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Question 19

Which of the following categories of system specification describes the technical requirements that cover a service, which is performed on a component of the system

Options:

A.

Product specification

B.

Process specification

C.

Material specification

D.

Development specification

Question 20

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation

Options:

A.

Chief Information Officer

B.

Chief Information Security Officer

C.

Chief Risk Officer

D.

Information System Owner

Question 21

Which of the following statements define the role of the ISSEP during the development of the detailed security design, as mentioned in the IATF document Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It identifies the information protection problems that needs to be solved.

B.

It allocates security mechanisms to system security design elements.

C.

It identifies custom security products.

D.

It identifies candidate commercial off-the-shelf (COTS)government off-the-shelf (GOTS) security products.

Question 22

Which of the following Registration Tasks sets up the business or operational functional description and system identification

Options:

A.

Registration Task 2

B.

Registration Task 1

C.

Registration Task 3

D.

Registration Task 4

Question 23

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

Options:

A.

Certification and accreditation (C&A)

B.

Risk Management

C.

Information systems security engineering (ISSE)

D.

Information Assurance (IA)

Question 24

John works as a security engineer for BlueWell Inc. He wants to identify the different functions that the system will need to perform to meet the documented missionbusiness needs. Which of the following processes will John use to achieve the task

Options:

A.

Modes of operation

B.

Performance requirement

C.

Functional requirement

D.

Technical performance measures

Question 25

Which of the following individuals is an upper-level manager who has the power and capability to evaluate the mission, business case, and budgetary needs of the system while also considering the security risks

Options:

A.

User Representative

B.

Program Manager

C.

Certifier

D.

DAA

Question 26

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Requested changes

D.

Qualitative risk analysis

Question 27

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The degree to which the security of the system, as it is defined, designed, and implemented, meets the security needs.

B.

The problem space is defined by the customer's mission or business needs.

C.

The systems engineer and information systems security engineer define the solution space, which is driven by the problem space.

D.

Always keep the problem and solution spaces separate.

Question 28

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure

Options:

A.

Manufacturing Extension Partnership

B.

NIST Laboratories

C.

Baldrige National Quality Program

D.

Advanced Technology Program

Question 29

The Concept of Operations (CONOPS) is a document describing the characteristics of a proposed system from the viewpoint of an individual who will use that system. Which of the following points are included in CONOPS Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Strategies, tactics, policies, and constraints affecting the system

B.

Organizations, activities, and interactions among participants and stakeholders

C.

Statement of the structure of the system

D.

Clear statement of responsibilities and authorities delegated

E.

Statement of the goals and objectives of the system

Question 30

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

Options:

A.

Operational scenarios

B.

Functional requirements

C.

Human factors

D.

Performance requirements

Question 31

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

Options:

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Page: 1 / 8
Total 213 questions