Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC ISSEP - ISSEP Information Systems Security Engineering Professional

Page: 1 / 7
Total 216 questions

Which of the following are the functional analysis and allocation tools Each correct answer represents a complete solution. Choose all that apply.

A.

Functional flow block diagram (FFBD)

B.

Activity diagram

C.

Timeline analysis diagram

D.

Functional hierarchy diagram

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

A.

UDP

B.

SSL

C.

IPSec

D.

HTTP

The risk transference is referred to the transfer of risks to a third party, usually for a fee, it creates a contractual-relationship for the third party to manage the risk on behalf of the performing organization. Which one of the following is NOT an example of the transference risk response

A.

Warranties

B.

Performance bonds

C.

Use of insurance

D.

Life cycle costing

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process

A.

Chief Information Officer

B.

Authorizing Official

C.

Common Control Provider

D.

Senior Agency Information Security Officer

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available

A.

Configuration Identification

B.

Configuration Verification and Audit

C.

Configuration Status and Accounting

D.

Configuration Control

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident

A.

Corrective controls

B.

Safeguards

C.

Detective controls

D.

Preventive controls

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution. Choose all that apply.

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSE provides advice on the impacts of system changes.

C.

An ISSE provides advice on the continuous monitoring of the information system.

D.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

E.

An ISSO takes part in the development activities that are required to implement system changes.

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

A.

Type accreditation

B.

Site accreditation

C.

System accreditation

D.

Secure accreditation

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response

A.

Project sponsor

B.

Risk owner

C.

Diane

D.

Subject matter expert

Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system

A.

Security Control Assessment Task 4

B.

Security Control Assessment Task 3

C.

Security Control Assessment Task 1

D.

Security Control Assessment Task 2