Free ISC CISSP-ISSEP Exam Questions (page: 2)

Which of the following approaches can be used to build a security program?
Each correct answer represents a complete solution. Choose all that apply.

  1. Right-Up Approach
  2. Left-Up Approach
  3. Bottom-Up Approach
  4. Top-Down Approach

Answer(s): C,D



Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems?

  1. National Security AgencyCentral Security Service (NSACSS)
  2. National Institute of Standards and Technology (NIST)
  3. United States Congress
  4. Committee on National Security Systems (CNSS)

Answer(s): D



Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary?

  1. Registration Task 3
  2. Registration Task 4
  3. Registration Task 2
  4. Registration Task 1

Answer(s): B



The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information.
Which of the following participants are required in a NIACAP security assessment?
Each correct answer represents a part of the solution. Choose all that apply.

  1. Information Assurance Manager
  2. Designated Approving Authority
  3. Certification agent
  4. IS program manager
  5. User representative

Answer(s): B,C,D,E



Which of the following elements are described by the functional requirements task?
Each correct answer represents a complete solution. Choose all that apply.

  1. Coverage
  2. Accuracy
  3. Quality
  4. Quantity

Answer(s): A,C,D



Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards?
Each correct answer represents a complete solution. Choose all that apply.

  1. CA Certification, Accreditation, and Security Assessments
  2. Information systems acquisition, development, and maintenance
  3. IR Incident Response
  4. SA System and Services Acquisition

Answer(s): A,C,D



Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

  1. ATM
  2. RTM
  3. CRO
  4. DAA

Answer(s): B



Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system?

  1. Process specification
  2. Product specification
  3. Development specification
  4. System specification

Answer(s): D






Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

CISSP-ISSEP Exam Discussions & Posts