Free ISC CISSP-ISSEP Exam Braindumps (page: 7)

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and
disabling of computer systems through the Internet?

A. DAS
B. IDS
C. ACL
D. Ipsec

Answer(s): B
QUESTION: 28

You work as a systems engineer for BlueWel Inc. You want to communicate the quantitative
and qualitative system characteristics to all stakeholders. Which of the following documents wil
you use to achieve the above task?

A. IMM
B. CONOPS
C. IPP
D. System Security Context

Answer(s): B
QUESTION: 29

Which of the following organizations is a USG initiative designed to meet the security testing,
evaluation, and assessment needs of both information technology (IT) producers and
consumers?

A. NSA
B. NIST
C. CNSS
D. NIAP

Answer(s): D
QUESTION: 30

Which of the following terms describes the security of an information system against
unauthorized access to or modification of information, whether in storage, processing, or transit,
and against the denial of service to authorized users or the provision of service to unauthorized
users?

A. Information Assurance (IA)
B. Information Systems Security Engineering (ISSE)
C. Information Protection Policy (IPP)
D. Information systems security (InfoSec)

Answer(s): D
QUESTION: 31

The DoD 8500 policy series represents the Department's information assurance strategy. Which
of the following objectives are defined by the DoD 8500 series?
Each correct answer represents a complete solution. Choose all that apply.
https://Free-Braindumps.com
8

Viewing page 7 of 51
Viewing questions 25 - 28 out of 214 questions



Post your Comments and Discuss ISC CISSP-ISSEP exam prep with other Community members:

CISSP-ISSEP Exam Discussions & Posts