ISC ISSEP - ISSEP Information Systems Security Engineering Professional
Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life
Which of the following refers to a process that is used for implementing information security
Which of the following protocols is used to establish a secure terminal to a remote network device
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability
According to which of the following DoD policies, the implementation of DITSCAP is mandatory for all the systems that process both DoD classified and unclassified information?
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information
Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.
Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist
A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies Each correct answer represents a complete solution. Choose all that apply.
FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals