ISC CISSP-ISSEP Exam
Information Systems Security Engineering Professional (Page 3 )

Updated On: 9-Feb-2026

Which of the following are the functional analysis and allocation tools?
Each correct answer represents a complete solution. Choose all that apply.

  1. Functional flow block diagram (FFBD)
  2. Activity diagram
  3. Timeline analysis diagram
  4. Functional hierarchy diagram

Answer(s): A,C,D



Which of the following Net-Centric Data Strategy goals are required to increase enterprise and community data over private user and system data?
Each correct answer represents a complete solution. Choose all that apply.

  1. Understandability
  2. Visibility
  3. Interoperability
  4. Accessibility

Answer(s): B,D



System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan?
Each correct answer represents a part of the solution. Choose all that apply.

  1. Certification
  2. Authorization
  3. Post-certification
  4. Post-Authorization
  5. Pre-certification

Answer(s): A,B,D,E



Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats?

  1. System Security Context
  2. Information Protection Policy (IPP)
  3. CONOPS
  4. IMM

Answer(s): B



Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States?

  1. Lanham Act
  2. FISMA
  3. Computer Fraud and Abuse Act
  4. Computer Misuse Act

Answer(s): B






Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

Join the CISSP-ISSEP Discussion