ISC2 ISSEP Exam
Information Systems Security Engineering Professional (Page 2 )

Updated On: 1-Feb-2026

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

  1. Level 4
  2. Level 5
  3. Level 1
  4. Level 2
  5. Level 3

Answer(s): A



Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it

  1. OMB M-99-18
  2. OMB M-00-13
  3. OMB M-03-19
  4. OMB M-00-07

Answer(s): A



Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system

  1. Process specification
  2. Product specification
  3. Development specification
  4. System specification

Answer(s): D



You have been tasked with finding an encryption methodology that will encrypt most types of email attachments. The requirements are that your solution must use the RSA algorithm. Which of the following is your best choice

  1. PGP
  2. SMIME
  3. DES
  4. Blowfish

Answer(s): B



Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

  1. Trusted computing base (TCB)
  2. Common data security architecture (CDSA)
  3. Internet Protocol Security (IPSec)
  4. Application program interface (API)

Answer(s): A



Viewing page 2 of 44
Viewing questions 6 - 10 out of 220 questions



Post your Comments and Discuss ISC2 ISSEP exam prep with other Community members:

Join the ISSEP Discussion