Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CISSP-ISSEP Questions and Answers

Note! Following CISSP-ISSEP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSEP Questions and Answers

Question # 6

Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks

A.

DoD 8500.1 Information Assurance (IA)

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.2 Information Assurance Implementation

Full Access
Question # 7

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Full Access
Question # 8

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense

A.

DoD 5200.22-M

B.

DoD 8910.1

C.

DoD 5200.40

D.

DoD 8000.1

Full Access
Question # 9

For interactive and self-paced preparation of exam ISSEP, try our practice exams.

Practice exams also include self assessment and reporting features!

Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

A.

Netcentric

Full Access
Question # 10

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

A.

Internet Protocol Security (IPSec)

B.

Common data security architecture (CDSA)

C.

File encryptors

D.

Application program interface (API)

Full Access
Question # 11

Registration Task 5 identifies the system security requirements. Which of the following elements of Registration Task 5 defines the type of data processed by the system

A.

Data security requirement

B.

Network connection rule

C.

Applicable instruction or directive

D.

Security concept of operation

Full Access
Question # 12

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure

A.

Manufacturing Extension Partnership

B.

NIST Laboratories

C.

Baldrige National Quality Program

D.

Advanced Technology Program

Full Access
Question # 13

Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

A.

It performs vulnerabilitythreat analysis assessment.

B.

It provides for entry and storage of individual system data.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Full Access
Question # 14

Fill in the blank with an appropriate phrase. The ______________ process is used for allocating performance and designing the requirements to each function.

A.

functional allocation

Full Access
Question # 15

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

A.

Internet Key Exchange (IKE) Protocol

B.

SMIME

C.

Internet Protocol Security (IPSec)

D.

Secure Socket Layer (SSL)

Full Access
Question # 16

Your project is an agricultural-based project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit. If your organization seizes this opportunity it would be an example of what risk response

A.

Enhancing

B.

Positive

C.

Opportunistic

D.

Exploiting

Full Access
Question # 17

Which of the following federal laws is designed to protect computer data from theft

A.

Federal Information Security Management Act (FISMA)

B.

Computer Fraud and Abuse Act (CFAA)

C.

Government Information Security Reform Act (GISRA)

D.

Computer Security Act

Full Access
Question # 18

Which of the following protocols is used to establish a secure terminal to a remote network device

A.

WEP

B.

SMTP

C.

SSH

D.

IPSec

Full Access
Question # 19

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Full Access
Question # 20

You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process

A.

Configuration management plan

B.

Transition plan

C.

Systems engineering management plan (SEMP)

D.

Acquisition plan

Full Access
Question # 21

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems

A.

Computer Fraud and Abuse Act

B.

Computer Security Act

C.

Gramm-Leach-Bliley Act

D.

Digital Millennium Copyright Act

Full Access
Question # 22

Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system

A.

Process specification

B.

Product specification

C.

Development specification

D.

System specification

Full Access
Question # 23

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

A.

Stateless packet filter firewall

B.

PIX firewall

C.

Stateful packet filter firewall

D.

Virtual firewall

Full Access
Question # 24

The principle of the SEMP is not to repeat the information, but rather to ensure that there are processes in place to conduct those functions. Which of the following sections of the SEMP template describes the work authorization procedures as well as change management approval processes

A.

Section 3.1.8

B.

Section 3.1.9

C.

Section 3.1.5

D.

Section 3.1.7

Full Access
Question # 25

Which of the following types of CNSS issuances describes how to implement the policy or prescribes the manner of a policy

A.

Advisory memoranda

B.

Instructions

C.

Policies

D.

Directives

Full Access
Question # 26

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system

A.

Phase 3

B.

Phase 2

C.

Phase 4

D.

Phase 1

Full Access
Question # 27

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

A.

FIPS 200

B.

NIST SP 800-50

C.

Traceability matrix

D.

FIPS 199

Full Access
Question # 28

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Full Access
Question # 29

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

A.

Type accreditation

B.

Site accreditation

C.

System accreditation

D.

Secure accreditation

Full Access
Question # 30

Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.

A.

Coverage

B.

Accuracy

C.

Quality

D.

Quantity

Full Access
Question # 31

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

A.

Phase 4

B.

Phase 2

C.

Phase 1

D.

Phase 3

Full Access