ISC2 ISSEP Exam
Information Systems Security Engineering Professional (Page 5 )

Updated On: 1-Feb-2026

The functional analysis process is used for translating system requirements into detailed function criteria.
Which of the following are the elements of functional analysis process Each correct answer represents a complete solution. Choose all that apply.

  1. Model possible overall system behaviors that are needed to achieve the system requirements.
  2. Develop concepts and alternatives that are not technology or component bound.
  3. Decompose functional requirements into discrete tasks or activities, the focus is still on technology not functions or components.
  4. Use a top-down with some bottom-up approach verification.

Answer(s): A,B,D



Which of the following acts is endorsed to provide a clear statement of the proscribed activity concerning computers to the law enforcement community, those who own and operate computers, and those tempted to commit crimes by unauthorized access to computers

  1. Computer Fraud and Abuse Act
  2. Government Information Security Reform Act (GISRA)
  3. Computer Security Act
  4. Federal Information Security Management Act (FISMA)

Answer(s): A



In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47 does the participating organizations perform the following tasks Perform preliminary activities. Examine all relevant technical, security and administrative issues. Form an agreement governing the management, operation, and use of the interconnection.

  1. Establishing the interconnection
  2. Disconnecting the interconnection
  3. Planning the interconnection
  4. Maintaining the interconnection

Answer(s): C



Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

  1. Phase 4
  2. Phase 2
  3. Phase 1
  4. Phase 3

Answer(s): D



Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

  1. Information Assurance (IA)
  2. Information Systems Security Engineering (ISSE)
  3. Information Protection Policy (IPP)
  4. Information systems security (InfoSec)

Answer(s): D



Viewing page 5 of 44
Viewing questions 21 - 25 out of 220 questions



Post your Comments and Discuss ISC2 ISSEP exam prep with other Community members:

Join the ISSEP Discussion