Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the ISC ISSEP Questions and answers with ValidTests

Exam ISSEP All Questions
Exam ISSEP Premium Access

View all detail and faqs for the ISSEP exam

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart

Options:

A.

Risk response plan

B.

Quantitative analysis

C.

Risk response

D.

Contingency reserve

Expert Solution
Questions # 12:

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

Options:

A.

Internet Key Exchange (IKE) Protocol

B.

SMIME

C.

Internet Protocol Security (IPSec)

D.

Secure Socket Layer (SSL)

Expert Solution
Questions # 13:

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system

Options:

A.

Phase 3

B.

Phase 2

C.

Phase 4

D.

Phase 1

Expert Solution
Questions # 14:

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The degree to which the security of the system, as it is defined, designed, and implemented, meets the security needs.

B.

The problem space is defined by the customer's mission or business needs.

C.

The systems engineer and information systems security engineer define the solution space, which is driven by the problem space.

D.

Always keep the problem and solution spaces separate.

Expert Solution
Questions # 15:

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

Options:

A.

Level 4

B.

Level 5

C.

Level 1

D.

Level 2

E.

Level 3

Expert Solution
Questions # 16:

Which of the following individuals is an upper-level manager who has the power and capability to evaluate the mission, business case, and budgetary needs of the system while also considering the security risks

Options:

A.

User Representative

B.

Program Manager

C.

Certifier

D.

DAA

Expert Solution
Questions # 17:

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors

Options:

A.

Federal Information Processing Standards (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP

Expert Solution
Questions # 18:

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation

Options:

A.

Chief Information Officer

B.

Chief Information Security Officer

C.

Chief Risk Officer

D.

Information System Owner

Expert Solution
Questions # 19:

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems

Options:

A.

SSAA

B.

FITSAF

C.

FIPS

D.

TCSEC

Expert Solution
Questions # 20:

The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3. What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Security operations

B.

Continue to review and refine the SSAA

C.

Change management

D.

Compliance validation

E.

System operations

F.

Maintenance of the SSAA

Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions