Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSEP Exam Dumps - ISSEP Information Systems Security Engineering Professional

Go to page:
Question # 9

The principle of the SEMP is not to repeat the information, but rather to ensure that there are processes in place to conduct those functions. Which of the following sections of the SEMP template describes the work authorization procedures as well as change management approval processes

A.

Section 3.1.8

B.

Section 3.1.9

C.

Section 3.1.5

D.

Section 3.1.7

Full Access
Question # 10

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

A.

Stateless packet filter firewall

B.

PIX firewall

C.

Stateful packet filter firewall

D.

Virtual firewall

Full Access
Question # 11

Which of the following guidelines is recommended for engineering, protecting, managing, processing, and controlling national security and sensitive (although unclassified) information

A.

Federal Information Processing Standard (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP by the United States Department of Defense (DoD)

Full Access
Question # 12

In which of the following DIACAP phases is residual risk analyzed

A.

Phase 2

B.

Phase 3

C.

Phase 5

D.

Phase 1

E.

Phase 4

Full Access
Question # 13

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response

A.

Project sponsor

B.

Risk owner

C.

Diane

D.

Subject matter expert

Full Access
Question # 14

Choose and reorder the security certification document tasks.

A.

Full Access
Question # 15

Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developed

A.

Security Control Assessment Task 3

B.

Security Control Assessment Task 1

C.

Security Control Assessment Task 4

D.

Security Control Assessment Task 2

Full Access
Question # 16

An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing Official Each correct answer represents a complete solution. Choose all that apply.

A.

Ascertaining the security posture of the organization's information system

B.

Reviewing security status reports and critical security documents

C.

Determining the requirement of reauthorization and reauthorizing information systems when required

D.

Establishing and implementing the organization's continuous monitoring program

Full Access
Go to page: