ISC CISSP-ISSEP Exam
Information Systems Security Engineering Professional (Page 7 )

Updated On: 9-Feb-2026

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities.
For your project archives, which one of the following is an output of risk monitoring and control?

  1. Quantitative risk analysis
  2. Risk audits
  3. Requested changes
  4. Qualitative risk analysis

Answer(s): C



Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

  1. DAS
  2. IDS
  3. ACL
  4. Ipsec

Answer(s): B



You work as a systems engineer for BlueWell Inc. You want to communicate the quantitative and qualitative system characteristics to all stakeholders. Which of the following documents will you use to achieve the above task?

  1. IMM
  2. CONOPS
  3. IPP
  4. System Security Context

Answer(s): B



Which of the following organizations is a USG initiative designed to meet the security testing, evaluation, and assessment needs of both information technology (IT) producers and consumers?

  1. NSA
  2. NIST
  3. CNSS
  4. NIAP

Answer(s): D



Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users?

  1. Information Assurance (IA)
  2. Information Systems Security Engineering (ISSE)
  3. Information Protection Policy (IPP)
  4. Information systems security (InfoSec)

Answer(s): D






Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

Join the CISSP-ISSEP Discussion