Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

ISSEP Sample Questions Answers

Questions 4

Registration Task 5 identifies the system security requirements. Which of the following elements of Registration Task 5 defines the type of data processed by the system

Options:

A.

Data security requirement

B.

Network connection rule

C.

Applicable instruction or directive

D.

Security concept of operation

Buy Now
Questions 5

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews

Options:

A.

Abbreviated

B.

Significant

C.

Substantial

D.

Comprehensive

Buy Now
Questions 6

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Certification

B.

Authorization

C.

Post-certification

D.

Post-Authorization

E.

Pre-certification

Buy Now
Questions 7

Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented

Options:

A.

Configuration verification and audit

B.

Configuration control

C.

Configuration status accounting

D.

Configuration identification

Buy Now
Questions 8

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

Options:

A.

Level 4

B.

Level 5

C.

Level 1

D.

Level 2

E.

Level 3

Buy Now
Questions 9

Fill in the blanks with an appropriate phrase. A ________ is an approved build of the product, and can be a single component or a combination of components.

Options:

A.

development baseline

Buy Now
Questions 10

Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist

Options:

A.

CL 2

B.

CL 3

C.

CL 1

D.

CL 4

Buy Now
Questions 11

Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Coverage

B.

Accuracy

C.

Quality

D.

Quantity

Buy Now
Questions 12

Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement (SSAA).

Options:

A.

DoDI 5200.40

Buy Now
Questions 13

Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs

Options:

A.

User representative

B.

DAA

C.

Certification Agent

D.

IS program manager

Buy Now
Questions 14

Drag and drop the correct DoD Policy Series at their appropriate places.

Options:

A.

Buy Now
Questions 15

In which of the following DIACAP phases is residual risk analyzed

Options:

A.

Phase 2

B.

Phase 3

C.

Phase 5

D.

Phase 1

E.

Phase 4

Buy Now
Questions 16

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

Options:

A.

UDP

B.

SSL

C.

IPSec

D.

HTTP

Buy Now
Questions 17

Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk

Options:

A.

Cyber Security Tip

B.

Cyber Security Alert

C.

Cyber Security Bulletin

D.

Technical Cyber Security Alert

Buy Now
Questions 18

Which of the following is an Information Assurance (IA) model that protects and defends information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Options:

A.

Parkerian Hexad

B.

Five Pillars model

C.

Capability Maturity Model (CMM)

D.

Classic information security model

Buy Now
Questions 19

Which of the following are the major tasks of risk management Each correct answer represents a complete solution. Choose two.

Options:

A.

Risk identification

B.

Building Risk free systems

C.

Assuring the integrity of organizational data

D.

Risk control

Buy Now
Questions 20

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

Options:

A.

FIPS 200

B.

NIST SP 800-50

C.

Traceability matrix

D.

FIPS 199

Buy Now
Questions 21

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47, do the organizations build and execute a plan for establishing the interconnection, including executing or configuring appropriate security controls

Options:

A.

Establishing the interconnection

B.

Planning the interconnection

C.

Disconnecting the interconnection

D.

Maintaining the interconnection

Buy Now
Questions 22

Della works as a security engineer for BlueWell Inc. She wants to establish configuration management and control procedures that will document proposed or actual changes to the information system. Which of the following phases of NIST SP 800-37 C&A methodology will define the above task

Options:

A.

Security Certification

B.

Security Accreditation

C.

Initiation

D.

Continuous Monitoring

Buy Now
Questions 23

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy

Options:

A.

Networks and Infrastructures

B.

Supporting Infrastructures

C.

Enclave Boundaries

D.

Local Computing Environments

Buy Now
Questions 24

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

Options:

A.

NSTISSP No. 7

B.

NSTISSP No. 11

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Buy Now
Questions 25

Which of the following policies describes the national policy on the secure electronic messaging service

Options:

A.

NSTISSP No. 11

B.

NSTISSP No. 7

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Buy Now
Questions 26

Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary

Options:

A.

Registration Task 3

B.

Registration Task 4

C.

Registration Task 2

D.

Registration Task 1

Buy Now
Questions 27

Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

Options:

A.

functional analysis

Buy Now
Questions 28

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47 does the participating organizations perform the following tasks Perform preliminary activities. Examine all relevant technical, security and administrative issues. Form an agreement governing the management, operation, and use of the interconnection.

Options:

A.

Establishing the interconnection

B.

Disconnecting the interconnection

C.

Planning the interconnection

D.

Maintaining the interconnection

Buy Now
Questions 29

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

Options:

A.

DTIC

B.

NSA IAD

C.

DIAP

D.

DARPA

Buy Now
Questions 30

Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

Options:

A.

Verification

B.

Validation

C.

Post accreditation

D.

Definition

Buy Now
Questions 31

Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Status reporting and documentation

B.

Security control monitoring and impact analyses of changes to the information system

C.

Configuration management and control

D.

Security accreditation documentation E. Security accreditation decision

Buy Now
Questions 32

Fill in the blank with an appropriate phrase. The ____________ helps the customer understand and document the information management needs that support the business or mission.

Options:

A.

systems engineer

Buy Now
Questions 33

Your project is an agricultural-based project that deals with plant irrigation systems. You have discovered a byproduct in your project that your organization could use to make a profit. If your organization seizes this opportunity it would be an example of what risk response

Options:

A.

Enhancing

B.

Positive

C.

Opportunistic

D.

Exploiting

Buy Now
Questions 34

Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

Options:

A.

Information Assurance (IA)

B.

Information Systems Security Engineering (ISSE)

C.

Information Protection Policy (IPP)

D.

Information systems security (InfoSec)

Buy Now
Questions 35

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

Options:

A.

Operational scenarios

B.

Functional requirements

C.

Human factors

D.

Performance requirements

Buy Now
Questions 36

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

Options:

A.

DTIC

B.

NSA IAD

C.

DIAP

D.

DARPA

Buy Now
Questions 37

Which of the following federal laws are related to hacking activities Each correct answer represents a complete solution. Choose three.

Options:

A.

18 U.S.C. 1030

B.

18 U.S.C. 1029

C.

18 U.S.C. 2510

D.

18 U.S.C. 1028

Buy Now
Questions 38

Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system

Options:

A.

Process specification

B.

Product specification

C.

Development specification

D.

System specification

Buy Now
Questions 39

The functional analysis process is used for translating system requirements into detailed function criteria. Which of the following are the elements of functional analysis process Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Model possible overall system behaviors that are needed to achieve the system requirements.

B.

Develop concepts and alternatives that are not technology or component bound.

C.

Decompose functional requirements into discrete tasks or activities, the focus is still on technology not functions or components.

D.

Use a top-down with some bottom-up approach verification.

Buy Now
Questions 40

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems

Options:

A.

NIST Special Publication 800-59

B.

NIST Special Publication 800-37

C.

NIST Special Publication 800-60

D.

NIST Special Publication 800-53

Buy Now
Questions 41

Which of the following sections of the SEMP template defines the project constraints, to include constraints on funding, personnel, facilities, manufacturing capability and capacity, critical resources, and other constraints

Options:

A.

Section 3.1.5

B.

Section 3.1.8

C.

Section 3.1.9

D.

Section 3.1.7

Buy Now
Questions 42

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

Options:

A.

Type I cryptography

B.

Type II cryptography

C.

Type III (E) cryptography

D.

Type III cryptography

Buy Now
Questions 43

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure

Options:

A.

Manufacturing Extension Partnership

B.

NIST Laboratories

C.

Baldrige National Quality Program

D.

Advanced Technology Program

Buy Now
Questions 44

Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It performs vulnerabilitythreat analysis assessment.

B.

It provides for entry and storage of individual system data.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Buy Now
Questions 45

Which of the following is a type of security management for computers and networks in order to identify security breaches

Options:

A.

IPS

B.

IDS

C.

ASA

D.

EAP

Buy Now
Questions 46

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

Options:

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Buy Now
Questions 47

FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact

Options:

A.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

B.

The loss of confidentiality, integrity, or availability might result in major financial losses.

C.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

D.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

Buy Now
Questions 48

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

Options:

A.

Certification and accreditation (C&A)

B.

Risk Management

C.

Information systems security engineering (ISSE)

D.

Information Assurance (IA)

Buy Now
Questions 49

Which of the following cooperative programs carried out by NIST provides a nationwide network of local centers offering technical and business assistance to small manufacturers

Options:

A.

NIST Laboratories

B.

Advanced Technology Program

C.

Manufacturing Extension Partnership

D.

Baldrige National Quality Program

Buy Now
Questions 50

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The degree to which the security of the system, as it is defined, designed, and implemented, meets the security needs.

B.

The problem space is defined by the customer's mission or business needs.

C.

The systems engineer and information systems security engineer define the solution space, which is driven by the problem space.

D.

Always keep the problem and solution spaces separate.

Buy Now
Questions 51

Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Office of Management and Budget (OMB)

B.

NIST

C.

FISMA

D.

FIPS

Buy Now
Questions 52

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

Buy Now
Questions 53

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

Options:

A.

Internet Key Exchange (IKE) Protocol

B.

SMIME

C.

Internet Protocol Security (IPSec)

D.

Secure Socket Layer (SSL)

Buy Now
Questions 54

Which of the following memorandums reminds the Federal agencies that it is required by law and policy to establish clear privacy policies for Web activities and to comply with those policies

Options:

A.

OMB M-01-08

B.

OMB M-03-19

C.

OMB M-00-07

D.

OMB M-00-13

Buy Now
Questions 55

Which of the following guidelines is recommended for engineering, protecting, managing, processing, and controlling national security and sensitive (although unclassified) information

Options:

A.

Federal Information Processing Standard (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP by the United States Department of Defense (DoD)

Buy Now
Questions 56

Which of the of following departments protects and supports DoD information, information systems, and information networks that are critical to the department and the armed forces during the day-to-day operations, and in the time of crisis

Options:

A.

DIAP

B.

DARPA

C.

DTIC

D.

DISA

Buy Now
Questions 57

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

Options:

A.

National Institute of Standards and Technology (NIST)

B.

National Security Agency (NSA)

C.

Committee on National Security Systems (CNSS)

D.

United States Congress

Buy Now
Questions 58

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event

Options:

A.

Acceptance

B.

Enhance

C.

Share

D.

Exploit

Buy Now
Questions 59

Which of the following is the acronym of RTM

Options:

A.

Resource tracking method

B.

Requirements Testing Matrix

C.

Requirements Traceability Matrix

D.

Resource timing method

Buy Now
Questions 60

Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process USG classified information

Options:

A.

NSTISSP No. 11

B.

NSTISSP No. 101

C.

NSTISSP No. 7

D.

NSTISSP No. 6

Buy Now
Questions 61

Which of the following CNSS policies describes the national policy on securing voice communications

Options:

A.

NSTISSP No. 6

B.

NSTISSP No. 7

C.

NSTISSP No. 101

D.

NSTISSP No. 200

Buy Now
Questions 62

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Develop DIACAP strategy.

B.

Initiate IA implementation plan.

C.

Conduct validation activity.

D.

Assemble DIACAP team.

E.

Register system with DoD Component IA Program.

F.

Assign IA controls.

Buy Now
Questions 63

Which of the following organizations is a USG initiative designed to meet the security testing, evaluation, and assessment needs of both information technology (IT) producers and consumers

Options:

A.

NSA

B.

NIST

C.

CNSS

D.

NIAP

Buy Now
Questions 64

Which of the following are the subtasks of the Define Life-Cycle Process Concepts task Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Training

B.

Personnel

C.

Control

D.

Manpower

Buy Now
Exam Code: ISSEP
Exam Name: ISSEP Information Systems Security Engineering Professional
Last Update: May 1, 2025
Questions: 216
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now ISSEP