ISC ISSEP Exam Questions
ISSEP Information Systems Security Engineering Professional (Page 7 )

Updated On: 24-Feb-2026

Which of the following statements is true about residual risks

  1. It can be considered as an indicator of threats coupled with vulnerability.
  2. It is a weakness or lack of safeguard that can be exploited by a threat.
  3. It is the probabilistic risk after implementing all security measures.
  4. It is the probabilistic risk before implementing all security measures.

Answer(s): C



According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution.
Choose all that apply.

  1. DC Security Design & Configuration
  2. EC Enclave and Computing Environment
  3. VI Vulnerability and Incident Management
  4. Information systems acquisition, development, and maintenance

Answer(s): A,B,C



Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution. Choose two.

  1. Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
  2. Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
  3. Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.
  4. Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Answer(s): B,C



Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

  1. UDP
  2. SSL
  3. IPSec
  4. HTTP

Answer(s): B



Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented

  1. Configuration verification and audit
  2. Configuration control
  3. Configuration status accounting
  4. Configuration identification

Answer(s): D






Post your Comments and Discuss ISC ISSEP exam dumps with other Community members:

Join the ISSEP Discussion