Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

ISSEP Information Systems Security Engineering Professional

Last Update 13 hours ago Total Questions : 216

The ISSEP Information Systems Security Engineering Professional content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include ISSEP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISSEP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISSEP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ISSEP Information Systems Security Engineering Professional practice test comfortably within the allotted time.

Question # 31

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy Each correct answer represents a part of the solution. Choose all that apply.

A.

What is being secured

B.

Who is expected to comply with the policy

C.

Where is the vulnerability, threat, or risk

D.

Who is expected to exploit the vulnerability

Question # 32

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

A.

Type accreditation

B.

Site accreditation

C.

System accreditation

D.

Secure accreditation

Question # 33

In which of the following DIACAP phases is residual risk analyzed

A.

Phase 2

B.

Phase 3

C.

Phase 5

D.

Phase 1

E.

Phase 4

Question # 34

Which of the following statements is true about residual risks

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is a weakness or lack of safeguard that can be exploited by a threat.

C.

It is the probabilistic risk after implementing all security measures.

D.

It is the probabilistic risk before implementing all security measures.

Question # 35

In 2003, NIST developed a new Certification & Accreditation (C & A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199 Each correct answer represents a complete solution. Choose all that apply.

A.

High

B.

Medium

C.

Low

D.

Moderate

Question # 36

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Question # 37

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

A.

Internet Protocol Security (IPSec)

B.

Common data security architecture (CDSA)

C.

File encryptors

D.

Application program interface (API)

Question # 38

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system

A.

System Owner

B.

Information Systems Security Officer (ISSO)

C.

Designated Approving Authority (DAA)

D.

Chief Information Security Officer (CISO)

Question # 39

You work as a security engineer for BlueWell Inc. According to you, which of the following DITSCAPNIACAP model phases occurs at the initiation of the project, or at the initial C & A effort of a legacy system

A.

Post Accreditation

B.

Definition

C.

Verification

D.

Validation

Question # 40

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment Each correct answer represents a part of the solution. Choose all that apply.

A.

Information Assurance Manager

B.

Designated Approving Authority

C.

Certification agent

D.

IS program manager

E.

User representative

Go to page: