Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

ISSEP Information Systems Security Engineering Professional

Last Update 13 hours ago Total Questions : 216

The ISSEP Information Systems Security Engineering Professional content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include ISSEP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISSEP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISSEP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ISSEP Information Systems Security Engineering Professional practice test comfortably within the allotted time.

Question # 21

Which of the following elements of Registration task 4 defines the system ' s external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system

A.

System firmware

B.

System software

C.

System interface

D.

System hardware

Question # 22

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

A.

Level 4

B.

Level 5

C.

Level 1

D.

Level 2

E.

Level 3

Question # 23

Which of the following Registration Tasks sets up the business or operational functional description and system identification

A.

Registration Task 2

B.

Registration Task 1

C.

Registration Task 3

D.

Registration Task 4

Question # 24

Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

A.

functional analysis

Question # 25

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors

A.

Federal Information Processing Standards (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP

Question # 26

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Question # 27

Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address

A.

Circuit-level gateway

B.

Application gateway

C.

Proxy server

D.

Packet Filtering

Question # 28

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems

A.

SSAA

B.

FITSAF

C.

FIPS

D.

TCSEC

Question # 29

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event

A.

Acceptance

B.

Enhance

C.

Share

D.

Exploit

Question # 30

Certification and Accreditation (C & A or CnA) is a process for implementing information security. Which of the following is the correct order of C & A phases in a DITSCAP assessment

A.

Definition, Validation, Verification, and Post Accreditation

B.

Verification, Definition, Validation, and Post Accreditation

C.

Verification, Validation, Definition, and Post Accreditation

D.

Definition, Verification, Validation, and Post Accreditation

Go to page: