ISC CISSP-ISSEP Exam
Information Systems Security Engineering Professional (Page 2 )

Updated On: 7-Feb-2026

Which of the following approaches can be used to build a security program?
Each correct answer represents a complete solution. Choose all that apply.

  1. Right-Up Approach
  2. Left-Up Approach
  3. Bottom-Up Approach
  4. Top-Down Approach

Answer(s): C,D



Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement (SSAA).

  1. DoDI 5200.40

Answer(s): A



Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle?

  1. Phase 1, Definition
  2. Phase 3, Validation
  3. Phase 4, Post Accreditation Phase
  4. Phase 2, Verification

Answer(s): C



Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks?

  1. DoD 8500.1 Information Assurance (IA)
  2. DoDI 5200.40
  3. DoD 8510.1-M DITSCAP
  4. DoD 8500.2 Information Assurance Implementation

Answer(s): D



Which of the following statements define the role of the ISSEP during the development of the detailed security design, as mentioned in the IATF document?
Each correct answer represents a complete solution. Choose all that apply.

  1. It identifies the information protection problems that needs to be solved.
  2. It allocates security mechanisms to system security design elements.
  3. It identifies custom security products.
  4. It identifies candidate commercial off-the-shelf (COTS) government off-the-shelf (GOTS) security products.

Answer(s): B,C,D






Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

Join the CISSP-ISSEP Discussion