CISSP-ISSEP : Information Systems Security Engineering Professional : Part 01

  1. Which of the following describes a residual risk as the risk remaining after a risk mitigation has occurred 

    • SSAA
    • ISSO
    • DAA
    • DIACAP
  2. Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies

    • NSACSS
    • OMB 
    • DCAA
    • NIST
  3. A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy Each correct answer represents a part of the solution. Choose all that apply.

    • What is being secured
    • Who is expected to comply with the policy
    • Where is the vulnerability, threat, or risk
    • Who is expected to exploit the vulnerability
  4. Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

    • NSTISSP No. 7
    • NSTISSP No. 11
    • NSTISSP No. 6 
    • NSTISSP No. 101
  5. SIMULATION

    Fill in the blanks with an appropriate phrase. The______________ is the process of translating system requirements into detailed function criteri a.

    • functional analysis
  6. Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will Della use to accomplish the task

    • Risk analysis
    • Functional allocation
    • Functional analysis 
    • Functional baseline
  7. Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

    • Trusted computing base (TCB) 
    • Common data security architecture (CDSA)
    • Internet Protocol Security (IPSec)
    • Application program interface (API)
  8. Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

    • PGP 
    • SMIME
    • TLS
    • IPSec
  9. Which of the following DITSCAPNIACAP model phases is used to confirm that the evolving system development and integration complies with the agreements between role players documented in the first phase

    • Verification 
    • Validation
    • Post accreditation
    • Definition
  10. Which of the following are the phases of the Certification and Accreditation (C&A) process Each correct answer represents a complete solution. Choose two. 

    • Auditing
    • Initiation
    • Continuous Monitoring
    • Detection
  11. You have been tasked with finding an encryption methodology that will encrypt most types of email attachments. The requirements are that your solution must use the RSA algorithm. Which of the following is your best choice

    • PGP
    • SMIME 
    • DES
    • Blowfish
  12. Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system

    • Process specification
    • Product specification
    • Development specification
    • System specification
  13. Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it

    • OMB M-99-18 
    • OMB M-00-13
    • OMB M-03-19
    • OMB M-00-07
  14. Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event

    • Earned value management
    • Risk audit
    • Corrective action 
    • Technical performance measurement
  15. Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users

    • Information Assurance (IA)
    • Information Systems Security Engineering (ISSE)
    • Information Protection Policy (IPP)
    • Information systems security (InfoSec)
  16. Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment

    • Phase 4
    • Phase 2
    • Phase 1
    • Phase 3
  17. Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

    • CL 3 
    • CL 4
    • CL 2
    • CL 1
  18. Which of the following sections of the SEMP template defines the project constraints, to include constraints on funding, personnel, facilities, manufacturing capability and capacity, critical resources, and other constraints

    • Section 3.1.5
    • Section 3.1.8 
    • Section 3.1.9
    • Section 3.1.7
  19. Which of the following CNSS policies describes the national policy on use of cryptomaterial by activities operating in high risk environments

    • CNSSP No. 14
    • NCSC No. 5 
    • NSTISSP No. 6
    • NSTISSP No. 7
  20. In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47 does the participating organizations perform the following tasks Perform preliminary activities. Examine all relevant technical, security and administrative issues. Form an agreement governing the management, operation, and use of the interconnection.

    • Establishing the interconnection
    • Disconnecting the interconnection
    • Planning the interconnection 
    • Maintaining the interconnection
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments