Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Ace the ISC ISSEP Exam: Ultimate Preparation Guide

Questions 41

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Assessment of the Analysis Results

B.

Certification analysis

C.

Registration

D.

System development

E.

Configuring refinement of the SSAA

Buy Now
Questions 42

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure

Options:

A.

Manufacturing Extension Partnership

B.

NIST Laboratories

C.

Baldrige National Quality Program

D.

Advanced Technology Program

Buy Now
Questions 43

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Organization of information security

B.

Human resources security

C.

Risk assessment and treatment

D.

AU audit and accountability

Buy Now
Questions 44

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

Options:

A.

NSTISSP No. 7

B.

NSTISSP No. 11

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Buy Now
Questions 45

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

Options:

A.

DAS

B.

IDS

C.

ACL

D.

Ipsec

Buy Now
Questions 46

Which of the following protocols is used to establish a secure terminal to a remote network device

Options:

A.

WEP

B.

SMTP

C.

SSH

D.

IPSec

Buy Now
Questions 47

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Certification

B.

Authorization

C.

Post-certification

D.

Post-Authorization

E.

Pre-certification

Buy Now
Questions 48

Which of the following types of CNSS issuances describes how to implement the policy or prescribes the manner of a policy

Options:

A.

Advisory memoranda

B.

Instructions

C.

Policies

D.

Directives

Buy Now
Questions 49

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control

Options:

A.

Quantitative risk analysis

B.

Risk audits

C.

Requested changes

D.

Qualitative risk analysis

Buy Now
Questions 50

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

Options:

A.

Internet Key Exchange (IKE) Protocol

B.

SMIME

C.

Internet Protocol Security (IPSec)

D.

Secure Socket Layer (SSL)

Buy Now