Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

Ace the ISC ISSEP Exam: Ultimate Preparation Guide

Questions 1

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS

Options:

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Buy Now
Questions 2

Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

Options:

A.

PGP

B.

SMIME

C.

TLS

D.

IPSec

Buy Now
Questions 3

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy

Options:

A.

Networks and Infrastructures

B.

Supporting Infrastructures

C.

Enclave Boundaries

D.

Local Computing Environments

Buy Now
Questions 4

Which of the following are the most important tasks of the Information Management Plan (IMP) Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Define the Information Protection Policy (IPP).

B.

Define the System Security Requirements.

C.

Define the mission need.

D.

Identify how the organization manages its information.

Buy Now
Questions 5

Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs

Options:

A.

User representative

B.

DAA

C.

Certification Agent

D.

IS program manager

Buy Now
Questions 6

Which of the following CNSS policies describes the national policy on securing voice communications

Options:

A.

NSTISSP No. 6

B.

NSTISSP No. 7

C.

NSTISSP No. 101

D.

NSTISSP No. 200

Buy Now
Questions 7

Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks

Options:

A.

DoD 8500.1 Information Assurance (IA)

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.2 Information Assurance Implementation

Buy Now
Questions 8

Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Status reporting and documentation

B.

Security control monitoring and impact analyses of changes to the information system

C.

Configuration management and control

D.

Security accreditation documentation E. Security accreditation decision

Buy Now
Questions 9

Which of the following categories of system specification describes the technical, performance, operational, maintenance, and support characteristics for the entire system

Options:

A.

Process specification

B.

Product specification

C.

Development specification

D.

System specification

Buy Now
Questions 10

Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process USG classified information

Options:

A.

NSTISSP No. 11

B.

NSTISSP No. 101

C.

NSTISSP No. 7

D.

NSTISSP No. 6

Buy Now