Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

Ace the ISC ISSEP Exam: Ultimate Preparation Guide

Questions 51

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system

Options:

A.

SSAA

B.

TCSEC

C.

FIPS

D.

FITSAF

Buy Now
Questions 52

Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk

Options:

A.

Cyber Security Tip

B.

Cyber Security Alert

C.

Cyber Security Bulletin

D.

Technical Cyber Security Alert

Buy Now
Questions 53

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

Options:

A.

Quality Assurance Manager

B.

Senior Analyst

C.

System Owner

D.

Federal program manager

Buy Now
Questions 54

Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis

Options:

A.

CL 3

B.

CL 4

C.

CL 2

D.

CL 1

Buy Now
Questions 55

Which of the following processes provides guidance to the system designers and form the basis of major events in the acquisition phases, such as testing the products for system integration

Options:

A.

Operational scenarios

B.

Functional requirements

C.

Human factors

D.

Performance requirements

Buy Now
Questions 56

Which of the following is the application of statistical methods to the monitoring and control of a process to ensure that it operates at its full potential to produce conforming product

Options:

A.

Information Assurance (IA)

B.

Statistical process control (SPC)

C.

Information Protection Policy (IPP)

D.

Information management model (IMM)

Buy Now
Questions 57

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

Options:

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Buy Now
Questions 58

The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise. What are the responsibilities of a Chief Information Officer Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Proposing the information technology needed by an enterprise to achieve its goals and then working within a budget to implement the plan

B.

Preserving high-level communications and working group relationships in an organization

C.

Establishing effective continuous monitoring program for the organization

D.

Facilitating the sharing of security risk-related information among authorizing officials

Buy Now
Questions 59

Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement (SSAA).

Options:

A.

DoDI 5200.40

Buy Now
Questions 60

The phase 3 of the Risk Management Framework (RMF) process is known as mitigation planning. Which of the following processes take place in phase 3 Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Agree on a strategy to mitigate risks.

B.

Evaluate mitigation progress and plan next assessment.

C.

Identify threats, vulnerabilities, and controls that will be evaluated.

D.

Document and implement a mitigation plan.

Buy Now