Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

ISSEP ISSEP Information Systems Security Engineering Professional Questions and Answers

Questions 4

Choose and reorder the steps to built the system security architectures in accordance with the DoDAF.

Options:

A.

Buy Now
Questions 5

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Organization of information security

B.

Human resources security

C.

Risk assessment and treatment

D.

AU audit and accountability

Buy Now
Questions 6

Which of the following elements of Registration task 4 defines the operating system, database management system, and software applications, and how they will be used

Options:

A.

System firmware

B.

System interface

C.

System software

D.

System hardware

Buy Now
Questions 7

Which of the following is the acronym of RTM

Options:

A.

Resource tracking method

B.

Requirements Testing Matrix

C.

Requirements Traceability Matrix

D.

Resource timing method

Buy Now
Questions 8

Which of the following terms describes the measures that protect and support information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Options:

A.

Information Systems Security Engineering (ISSE)

B.

Information Protection Policy (IPP)

C.

Information systems security (InfoSec)

D.

Information Assurance (IA)

Buy Now
Questions 9

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system

Options:

A.

Phase 3

B.

Phase 2

C.

Phase 4

D.

Phase 1

Buy Now
Questions 10

Which of the following is NOT used in the practice of Information Assurance (IA) to define assurance requirements

Options:

A.

Classic information security model

B.

Five Pillars model

C.

Communications Management Plan

D.

Parkerian Hexad

Buy Now
Questions 11

Which of the following tasks prepares the technical management plan in planning the technical effort

Options:

A.

Task 10

B.

Task 9

C.

Task 7

D.

Task 8

Buy Now
Questions 12

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

Options:

A.

DTIC

B.

NSA IAD

C.

DIAP

D.

DARPA

Buy Now
Questions 13

Which of the following memorandums reminds the Federal agencies that it is required by law and policy to establish clear privacy policies for Web activities and to comply with those policies

Options:

A.

OMB M-01-08

B.

OMB M-03-19

C.

OMB M-00-07

D.

OMB M-00-13

Buy Now
Questions 14

The risk transference is referred to the transfer of risks to a third party, usually for a fee, it creates a contractual-relationship for the third party to manage the risk on behalf of the performing organization. Which one of the following is NOT an example of the transference risk response

Options:

A.

Warranties

B.

Performance bonds

C.

Use of insurance

D.

Life cycle costing

Buy Now
Questions 15

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution. Choose two.

Options:

A.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

C.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

D.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Buy Now
Questions 16

What NIACAP certification levels are recommended by the certifier Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Basic System Review

B.

Basic Security Review

C.

Maximum Analysis

D.

Comprehensive Analysis

E.

Detailed Analysis

F.

Minimum Analysis

Buy Now
Questions 17

Choose and reorder the steps involved in the trade-off analysis.

Options:

A.

Buy Now
Questions 18

Which of the following tools demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators

Options:

A.

ISO 90012000

B.

Benchmarking

C.

SEI-CMM

D.

Six Sigma

Buy Now
Questions 19

What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Integrates security considerations into application and system purchasing decisions and development projects.

B.

Ensures that the necessary security controls are in place.

C.

Ensures that adequate security is being provided by the necessary controls, password management, remote access controls, operating system configurations, and so on.

D.

Ensures that the systems are properly assessed for vulnerabilities and must report any to the incident response team and data owner.

Buy Now
Questions 20

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

Options:

A.

Operational scenarios

B.

Functional requirements

C.

Human factors

D.

Performance requirements

Buy Now
Questions 21

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

Options:

A.

Phase 4

B.

Phase 2

C.

Phase 1

D.

Phase 3

Buy Now
Questions 22

Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary

Options:

A.

Registration Task 3

B.

Registration Task 4

C.

Registration Task 2

D.

Registration Task 1

Buy Now
Questions 23

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

Options:

A.

FIPS 200

B.

NIST SP 800-50

C.

Traceability matrix

D.

FIPS 199

Buy Now
Questions 24

Which of the following tasks describes the processes required to ensure that the project includes all the work required, and only the work required, to complete the project successfully

Options:

A.

Identify Roles and Responsibilities

B.

Develop Project Schedule

C.

Identify Resources and Availability

D.

Estimate project scope

Buy Now
Questions 25

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Information Assurance Manager

B.

Designated Approving Authority

C.

Certification agent

D.

IS program manager

E.

User representative

Buy Now
Questions 26

Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement (SSAA).

Options:

A.

DoDI 5200.40

Buy Now
Questions 27

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

Options:

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Buy Now
Questions 28

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

Options:

A.

Level 4

B.

Level 5

C.

Level 1

D.

Level 2

E.

Level 3

Buy Now
Questions 29

Which of the following tasks obtains the customer agreement in planning the technical effort

Options:

A.

Task 9

B.

Task 11

C.

Task 8

D.

Task 10

Buy Now
Questions 30

You work as an ISSE for BlueWell Inc. You want to break down user roles, processes, and information until ambiguity is reduced to a satisfactory degree. Which of the following tools will help you to perform the above task

Options:

A.

PERT Chart

B.

Gantt Chart

C.

Functional Flow Block Diagram

D.

Information Management Model (IMM)

Buy Now
Questions 31

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Certification

B.

Authorization

C.

Post-certification

D.

Post-Authorization

E.

Pre-certification

Buy Now
Questions 32

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation

Options:

A.

Chief Information Officer

B.

Chief Information Security Officer

C.

Chief Risk Officer

D.

Information System Owner

Buy Now
Exam Code: ISSEP
Exam Name: ISSEP Information Systems Security Engineering Professional
Last Update: Nov 23, 2024
Questions: 216

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99