CISSP-ISSEP | Practical CISSP-ISSEP Free Practice Questions 2021

Want to know features? Want to lear more about experience? Study . Gat a success with an absolute guarantee to pass ISC2 CISSP-ISSEP (Information Systems Security Engineering Professional) test on your first attempt.

ISC2 CISSP-ISSEP Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site

  • A. ASSET
  • B. NSA-IAM
  • C. NIACAP
  • D. DITSCAP

Answer: C

NEW QUESTION 2
Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system

  • A. Phase 3
  • B. Phase 2
  • C. Phase 4
  • D. Phase 1

Answer: B

NEW QUESTION 3
Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process

  • A. Chief Information Officer
  • B. Authorizing Official
  • C. Common Control Provider
  • D. Senior Agency Information Security Officer

Answer: C

NEW QUESTION 4
Fill in the blank with the appropriate phrase. The is the risk that remains after the implementation of new or enhanced controls.

  • A. residual risk

Answer: A

NEW QUESTION 5
Which of the following cooperative programs carried out by NIST provides a nationwide network of local centers offering technical and business assistance to small manufacturers

  • A. NIST Laboratories
  • B. Advanced Technology Program
  • C. Manufacturing Extension Partnership
  • D. Baldrige National Quality Program

Answer: C

NEW QUESTION 6
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

  • A. Phase 4
  • B. Phase 2
  • C. Phase 1
  • D. Phase 3

Answer: D

NEW QUESTION 7
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and
telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

  • A. Type accreditation
  • B. Site accreditation
  • C. System accreditation
  • D. Secure accreditation

Answer: ABC

NEW QUESTION 8
Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address

  • A. Circuit-level gateway
  • B. Application gateway
  • C. Proxy server
  • D. Packet Filtering

Answer: D

NEW QUESTION 9
John works as a security engineer for BlueWell Inc. He wants to identify the different functions that the system will need to perform to meet the documented missionbusiness needs. Which of the following processes will John use to achieve the task

  • A. Modes of operation
  • B. Performance requirement
  • C. Functional requirement
  • D. Technical performance measures

Answer: C

NEW QUESTION 10
Which of the following policies describes the national policy on the secure electronic messaging service

  • A. NSTISSP N
  • B. 11
  • C. NSTISSP N
  • D. 7
  • E. NSTISSP N
  • F. 6
  • G. NSTISSP N
  • H. 101

Answer: B

NEW QUESTION 11
Which of the following assessment methodologies defines a six-step technical security evaluation

  • A. FITSAF
  • B. OCTAVE
  • C. FIPS 102
  • D. DITSCAP

Answer: C

NEW QUESTION 12
Fill in the blank with an appropriate phrase. The process is used for allocating performance and designing the requirements to each function.

  • A. functional allocation

Answer: A

NEW QUESTION 13
Which of the following organizations incorporates building secure audio and video
communications equipment, making tamper protection products, and providing trusted microelectronics solutions

  • A. DTIC
  • B. NSA IAD
  • C. DIAP
  • D. DARPA

Answer: B

NEW QUESTION 14
Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats

  • A. System Security Context
  • B. Information Protection Policy (IPP)
  • C. CONOPS
  • D. IMM

Answer: B

NEW QUESTION 15
Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual

  • A. DoD 8910.1
  • B. DoD 7950.1-M
  • C. DoD 5200.22-M
  • D. DoD 5200.1-R
  • E. DoDD 8000.1

Answer: B

NEW QUESTION 16
Which of the following federal laws is designed to protect computer data from theft

  • A. Federal Information Security Management Act (FISMA)
  • B. Computer Fraud and Abuse Act (CFAA)
  • C. Government Information Security Reform Act (GISRA)
  • D. Computer Security Act

Answer: B

NEW QUESTION 17
Which of the following protocols is used to establish a secure terminal to a remote network device

  • A. WEP
  • B. SMTP
  • C. SSH
  • D. IPSec

Answer: C

NEW QUESTION 18
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution. Choose all that apply.

  • A. DC Security Design & Configuration
  • B. EC Enclave and Computing Environment
  • C. VI Vulnerability and Incident Management
  • D. Information systems acquisition, development, and maintenance

Answer: ABC

P.S. Easily pass CISSP-ISSEP Exam with 213 Q&As Certleader Dumps & pdf Version, Welcome to Download the Newest Certleader CISSP-ISSEP Dumps: https://www.certleader.com/CISSP-ISSEP-dumps.html (213 New Questions)