ISC2 ISSEP Exam
Information Systems Security Engineering Professional (Page 4 )

Updated On: 1-Feb-2026

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

  1. NSTISSP No. 7
  2. NSTISSP No. 11
  3. NSTISSP No. 6
  4. NSTISSP No. 101

Answer(s): C



Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

  1. PGP
  2. SMIME
  3. TLS
  4. IPSec

Answer(s): A,B



Which of the following cooperative programs carried out by NIST speed ups the development of modern technologies for broad, national benefit by co-funding research and development partnerships with the private sector

  1. Baldrige National Quality Program
  2. Advanced Technology Program
  3. Manufacturing Extension Partnership
  4. NIST Laboratories

Answer(s): B



Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States Code

  1. Type I cryptography
  2. Type II cryptography
  3. Type III (E) cryptography
  4. Type III cryptography

Answer(s): B



Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

  1. It performs vulnerabilitythreat analysis assessment.
  2. It provides for entry and storage of individual system data.
  3. It provides data needed to accurately assess IA readiness.
  4. It identifies and generates IA requirements.

Answer(s): A,C,D



Viewing page 4 of 44
Viewing questions 16 - 20 out of 220 questions



Post your Comments and Discuss ISC2 ISSEP exam prep with other Community members:

Join the ISSEP Discussion