ISC CISSP-ISSEP Exam
Information Systems Security Engineering Professional (Page 5 )

Updated On: 9-Feb-2026

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code?

  1. Type I cryptography
  2. Type II cryptography
  3. Type III (E) cryptography
  4. Type III cryptography

Answer(s): B



Which of the following NIST documents describes that minimizing negative impact on an organization and a need for sound basis in decision making are the fundamental reasons organizations implement a risk management process for their IT systems?

  1. NIST SP 800-37
  2. NIST SP 800-30
  3. NIST SP 800-53
  4. NIST SP 800-60

Answer(s): B



Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure?

  1. Manufacturing Extension Partnership
  2. NIST Laboratories
  3. Baldrige National Quality Program
  4. Advanced Technology Program

Answer(s): B



Which of the following memorandums reminds the departments and agencies of the OMB principles for including and funding security as an element of agency information technology systems and architectures and of the decision criteria which is used to evaluate security for information systems investments?

  1. OMB M-00-13
  2. OMB M-99-18
  3. OMB M-00-07
  4. OMB M-03-19

Answer(s): C



Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

  1. SSAA
  2. TCSEC
  3. FIPS
  4. FITSAF

Answer(s): B






Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

Join the CISSP-ISSEP Discussion