aiotestking uk

CISSP-ISSEP Exam Questions - Online Test


CISSP-ISSEP Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

It is more faster and easier to pass the by using . Immediate access to the and find the same core area with professionally verified answers, then PASS your exam with a high score now.

Also have CISSP-ISSEP free dumps questions for you:

NEW QUESTION 1
What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

  • A. Develop DIACAP strategy.
  • B. Initiate IA implementation plan.
  • C. Conduct validation activity.
  • D. Assemble DIACAP team.
  • E. Register system with DoD Component IA Program.
  • F. Assign IA controls.

Answer: ABDEF

NEW QUESTION 2
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability

  • A. MAC I
  • B. MAC II
  • C. MAC IV
  • D. MAC III

Answer: D

NEW QUESTION 3
For interactive and self-paced preparation of exam ISSEP, try our practice exams. Practice exams also include self assessment and reporting features!
Fill in the blank with an appropriate word. has the goal to securely interconnect people and systems independent of time or location.

  • A. Netcentric

Answer: A

NEW QUESTION 4
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.

  • A. DC Security Design & Configuration
  • B. EC Enclave and Computing Environment
  • C. VI Vulnerability and Incident Management
  • D. Information systems acquisition, development, and maintenance

Answer: ABC

NEW QUESTION 5
Which of the following types of CNSS issuances establishes or describes policy and
programs, provides authority, or assigns responsibilities

  • A. Instructions
  • B. Directives
  • C. Policies
  • D. Advisory memoranda

Answer: B

NEW QUESTION 6
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and
telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

  • A. Type accreditation
  • B. Site accreditation
  • C. System accreditation
  • D. Secure accreditation

Answer: ABC

NEW QUESTION 7
Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

  • A. Quality Assurance Manager
  • B. Senior Analyst
  • C. System Owner
  • D. Federal program manager

Answer: D

NEW QUESTION 8
Which of the of following departments protects and supports DoD information, information systems, and information networks that are critical to the department and the armed forces during the day-to-day operations, and in the time of crisis

  • A. DIAP
  • B. DARPA
  • C. DTIC
  • D. DISA

Answer: A

NEW QUESTION 9
The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.

  • A. Assessment of the Analysis Results
  • B. Certification analysis
  • C. Registration
  • D. System development
  • E. Configuring refinement of the SSAA

Answer: ABDE

NEW QUESTION 10
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing Standard

  • A. Type III (E) cryptography
  • B. Type III cryptography
  • C. Type I cryptography
  • D. Type II cryptography

Answer: B

NEW QUESTION 11
Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems

  • A. National Security AgencyCentral Security Service (NSACSS)
  • B. National Institute of Standards and Technology (NIST)
  • C. United States Congress
  • D. Committee on National Security Systems (CNSS)

Answer: D

NEW QUESTION 12
Which of the following acts promote a risk-based policy for cost effective security Each correct answer represents a part of the solution. Choose all that apply.

  • A. Clinger-Cohen Act
  • B. Lanham Act
  • C. Paperwork Reduction Act (PRA)
  • D. Computer Misuse Act

Answer: AC

NEW QUESTION 13
The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series Each correct answer represents a complete solution. Choose all that apply.

  • A. Providing IA Certification and Accreditation
  • B. Providing command and control and situational awareness
  • C. Defending systems
  • D. Protecting information

Answer: BCD

NEW QUESTION 14
Which of the following is NOT used in the practice of Information Assurance (IA) to define assurance requirements

  • A. Classic information security model
  • B. Five Pillars model
  • C. Communications Management Plan
  • D. Parkerian Hexad

Answer: C

NEW QUESTION 15
Which of the following CNSS policies describes the national policy on securing voice communications

  • A. NSTISSP N
  • B. 6
  • C. NSTISSP N
  • D. 7
  • E. NSTISSP N
  • F. 101
  • G. NSTISSP N
  • H. 200

Answer: C

NEW QUESTION 16
Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

  • A. PGP
  • B. SMIME
  • C. TLS
  • D. IPSec

Answer: AB

NEW QUESTION 17
Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process Each correct answer represents a complete solution. Choose all that apply.

  • A. Status reporting and documentation
  • B. Security control monitoring and impact analyses of changes to the information system
  • C. Configuration management and control
  • D. Security accreditation documentation
  • E. Security accreditation decision

Answer: ABC

NEW QUESTION 18
Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system

  • A. System Owner
  • B. Information Systems Security Officer (ISSO)
  • C. Designated Approving Authority (DAA)
  • D. Chief Information Security Officer (CISO)

Answer: C

100% Valid and Newest Version CISSP-ISSEP Questions & Answers shared by Certleader, Get Full Dumps HERE: https://www.certleader.com/CISSP-ISSEP-dumps.html (New 213 Q&As)