Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC ISSEP - ISSEP Information Systems Security Engineering Professional

Page: 4 / 7
Total 216 questions

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

A.

National Institute of Standards and Technology (NIST)

B.

National Security Agency (NSA)

C.

Committee on National Security Systems (CNSS)

D.

United States Congress

Which of the following refers to a process that is used for implementing information security

A.

Classic information security model

B.

Certification and Accreditation (C&A)

C.

Information Assurance (IA)

D.

Five Pillars model

Which of the following protocols is used to establish a secure terminal to a remote network device

A.

WEP

B.

SMTP

C.

SSH

D.

IPSec

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability

A.

MAC I

B.

MAC II

C.

MAC III

D.

MAC IV

According to which of the following DoD policies, the implementation of DITSCAP is mandatory for all the systems that process both DoD classified and unclassified information?

A.

DoD 8500.2

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.1 (IAW)

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information

A.

Type III cryptography

B.

Type III (E) cryptography

C.

Type II cryptography

D.

Type I cryptography

Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

A.

functional analysis

Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist

A.

CL 2

B.

CL 3

C.

CL 1

D.

CL 4

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies Each correct answer represents a complete solution. Choose all that apply.

A.

Regulatory

B.

Advisory

C.

Systematic

D.

Informative

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals

A.

Moderate

B.

Medium

C.

High

D.

Low