Free ISC CISSP-ISSEP Exam Questions (page: 13)

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

  1. Risk acceptance
  2. Risk mitigation
  3. Risk avoidance
  4. Risk transfer

Answer(s): D



Which of the following are the most important tasks of the Information Management Plan (IMP)?
Each correct answer represents a complete solution. Choose all that apply.

  1. Define the Information Protection Policy (IPP).
  2. Define the System Security Requirements.
  3. Define the mission need.
  4. Identify how the organization manages its information.

Answer(s): A,C,D



Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network-centric warfare?

  1. DoD 8500.2 Information Assurance Implementation
  2. DoD 8510.1-M DITSCAP
  3. DoDI 5200.40
  4. DoD 8500.1 Information Assurance (IA)

Answer(s): D



In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199?
Each correct answer represents a complete solution. Choose all that apply.

  1. High
  2. Medium
  3. Low
  4. Moderate

Answer(s): A,B,C



Which of the following federal laws establishes roles and responsibilities for information security, risk management, testing, and training, and authorizes NIST and NSA to provide guidance for security planning and implementation?

  1. Computer Fraud and Abuse Act
  2. Government Information Security Reform Act (GISRA)
  3. Federal Information Security Management Act (FISMA)
  4. Computer Security Act

Answer(s): B



Which of the following agencies serves the DoD community as the largest central resource for DoD and government- funded scientific, technical, engineering, and business related information available today?

  1. DISA
  2. DIAP
  3. DTIC
  4. DARPA

Answer(s): C



DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability?

  1. MAC I
  2. MAC II
  3. MAC III
  4. MAC IV

Answer(s): B



Which of the following categories of system specification describes the technical requirements that cover a service, which is performed on a component of the system?

  1. Product specification
  2. Process specification
  3. Material specification
  4. Development specification

Answer(s): B



Viewing page 13 of 28
Viewing questions 49 - 52 out of 214 questions



Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

CISSP-ISSEP Exam Discussions & Posts