New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ISC ISSEP ISSEP Information Systems Security Engineering Professional Exam Practice Test

Page: 1 / 22
Total 216 questions

ISSEP Information Systems Security Engineering Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability

Options:

A.

MAC I

B.

MAC II

C.

MAC IV

D.

MAC III

Question 2

You work as a system engineer for BlueWell Inc. You want to verify that the build meets its data requirements, and correctly generates each expected display and report. Which of the following tests will help you to perform the above task

Options:

A.

Functional test

B.

Reliability test

C.

Performance test

D.

Regression test

Question 3

Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it

Options:

A.

OMB M-99-18

B.

OMB M-00-13

C.

OMB M-03-19

D.

OMB M-00-07

Question 4

Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States

Options:

A.

Lanham Act

B.

FISMA

C.

Computer Fraud and Abuse Act

D.

Computer Misuse Act

Question 5

Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems

Options:

A.

Computer Fraud and Abuse Act

B.

Computer Security Act

C.

Gramm-Leach-Bliley Act

D.

Digital Millennium Copyright Act

Question 6

Which of the following acts is endorsed to provide a clear statement of the proscribed activity concerning computers to the law enforcement community, those who own and operate computers, and those tempted to commit crimes by unauthorized access to computers

Options:

A.

Computer Fraud and Abuse Act

B.

Government Information Security Reform Act (GISRA)

C.

Computer Security Act

D.

Federal Information Security Management Act (FISMA)

Question 7

Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

Options:

A.

Information Assurance (IA)

B.

Information Systems Security Engineering (ISSE)

C.

Information Protection Policy (IPP)

D.

Information systems security (InfoSec)

Question 8

Which of the following policies describes the national policy on the secure electronic messaging service

Options:

A.

NSTISSP No. 11

B.

NSTISSP No. 7

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Question 9

Which of the following is the application of statistical methods to the monitoring and control of a process to ensure that it operates at its full potential to produce conforming product

Options:

A.

Information Assurance (IA)

B.

Statistical process control (SPC)

C.

Information Protection Policy (IPP)

D.

Information management model (IMM)

Question 10

Which of the following NIST documents describes that minimizing negative impact on an organization and a need for sound basis in decision making are the fundamental reasons organizations implement a risk management process for their IT systems

Options:

A.

NIST SP 800-37

B.

NIST SP 800-30

C.

NIST SP 800-53

D.

NIST SP 800-60

Question 11

Which of the following DoD policies establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels

Options:

A.

DoD 8500.1 Information Assurance (IA)

B.

DoD 8500.2 Information Assurance Implementation

C.

DoDI 5200.40

D.

DoD 8510.1-M DITSCAP

Question 12

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information

Options:

A.

Type III cryptography

B.

Type III (E) cryptography

C.

Type II cryptography

D.

Type I cryptography

Question 13

Which of the following individuals reviews and approves project deliverables from a QA perspective

Options:

A.

Information systems security engineer

B.

System owner

C.

Quality assurance manager

D.

Project manager

Question 14

Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs

Options:

A.

User representative

B.

DAA

C.

Certification Agent

D.

IS program manager

Question 15

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies

Options:

A.

NSACSS

B.

OMB

C.

DCAA

D.

NIST

Question 16

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system

Options:

A.

SSAA

B.

TCSEC

C.

FIPS

D.

FITSAF

Question 17

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

Options:

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Question 18

Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Coverage

B.

Accuracy

C.

Quality

D.

Quantity

Question 19

Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment

Options:

A.

Definition, Validation, Verification, and Post Accreditation

B.

Verification, Definition, Validation, and Post Accreditation

C.

Verification, Validation, Definition, and Post Accreditation

D.

Definition, Verification, Validation, and Post Accreditation

Question 20

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

Options:

A.

FIPS 200

B.

NIST SP 800-50

C.

Traceability matrix

D.

FIPS 199

Question 21

Which of the following types of CNSS issuances describes how to implement the policy or prescribes the manner of a policy

Options:

A.

Advisory memoranda

B.

Instructions

C.

Policies

D.

Directives

Question 22

Which of the following assessment methodologies defines a six-step technical security evaluation

Options:

A.

FITSAF

B.

OCTAVE

C.

FIPS 102

D.

DITSCAP

Question 23

Which of the following terms describes the measures that protect and support information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Options:

A.

Information Systems Security Engineering (ISSE)

B.

Information Protection Policy (IPP)

C.

Information systems security (InfoSec)

D.

Information Assurance (IA)

Question 24

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals

Options:

A.

Moderate

B.

Medium

C.

High

D.

Low

Question 25

An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing Official Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ascertaining the security posture of the organization's information system

B.

Reviewing security status reports and critical security documents

C.

Determining the requirement of reauthorization and reauthorizing information systems when required

D.

Establishing and implementing the organization's continuous monitoring program

Question 26

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

Options:

A.

Type I cryptography

B.

Type II cryptography

C.

Type III (E) cryptography

D.

Type III cryptography

Question 27

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted as a Federal Information Processing Standard

Options:

A.

Type III (E) cryptography

B.

Type III cryptography

C.

Type I cryptography

D.

Type II cryptography

Question 28

Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.

Options:

A.

System Analysis

Question 29

You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process

Options:

A.

Design information systems that will meet the certification and accreditation documentation.

B.

Identify the information protection needs.

C.

Ensure information systems are designed and developed with functional relevance.

D.

Instruct systems engineers on availability, integrity, and confidentiality.

Question 30

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure

Options:

A.

Manufacturing Extension Partnership

B.

NIST Laboratories

C.

Baldrige National Quality Program

D.

Advanced Technology Program

Question 31

Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Right-Up Approach

B.

Left-Up Approach

C.

Bottom-Up Approach

D.

Top-Down Approach

Question 32

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

Options:

A.

Phase 4

B.

Phase 2

C.

Phase 1

D.

Phase 3

Page: 1 / 22
Total 216 questions