ISC ISSEP Exam
ISSEP Information Systems Security Engineering Professional (Page 3 )

Updated On: 1-Feb-2026

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy Each correct answer represents a part of the solution. Choose all that apply.

  1. What is being secured
  2. Who is expected to comply with the policy
  3. Where is the vulnerability, threat, or risk
  4. Who is expected to exploit the vulnerability

Answer(s): A,B,C



Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies

  1. NSACSS
  2. OMB
  3. DCAA
  4. NIST

Answer(s): B



Which of the following describes a residual risk as the risk remaining after a risk mitigation has occurred

  1. SSAA
  2. ISSO
  3. DAA
  4. DIACAP

Answer(s): D



Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will Della use to accomplish the task

  1. Risk analysis
  2. Functional allocation
  3. Functional analysis
  4. Functional baseline

Answer(s): C



Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

  1. functional analysis

Answer(s): A



Viewing page 3 of 44
Viewing questions 11 - 15 out of 221 questions



Post your Comments and Discuss ISC ISSEP exam prep with other Community members:

Join the ISSEP Discussion