Free ISSEP Exam Braindumps (page: 14)

Page 13 of 54

Which of the following assessment methodologies defines a six-step technical security evaluation

  1. FITSAF
  2. OCTAVE
  3. FIPS 102
  4. DITSCAP

Answer(s): C



What are the subordinate tasks of the Implement and Validate Assigned IA Control phase in the DIACAP process Each correct answer represents a complete solution. Choose all that apply.

  1. Conduct activities related to the disposition of the system data and objects.
  2. Combine validation results in DIACAP scorecard.
  3. Conduct validation activities.
  4. Execute and update IA implementation plan.

Answer(s): B,C,D



Which of the following memorandums reminds the Federal agencies that it is required by law and policy to establish clear privacy policies for Web activities and to comply with those policies

  1. OMB M-01-08
  2. OMB M-03-19
  3. OMB M-00-07
  4. OMB M-00-13

Answer(s): D



Lisa is the project manager of the SQL project for her company. She has completed the risk response planning with her project team and is now ready to update the risk register to reflect the risk response. Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created

  1. The level of detail must define exactly the risk response for each identified risk.
  2. The level of detail is set of project risk governance.
  3. The level of detail is set by historical information.
  4. The level of detail should correspond with the priority ranking.

Answer(s): D






Post your Comments and Discuss ISC ISSEP exam with other Community members:

ISSEP Discussions & Posts