Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSEP Exam Dumps - ISSEP Information Systems Security Engineering Professional

Go to page:
Question # 17

Which of the following security controls works as the totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy

A.

Trusted computing base (TCB)

B.

Common data security architecture (CDSA)

C.

Internet Protocol Security (IPSec)

D.

Application program interface (API)

Full Access
Question # 18

Which of the following phases of the ISSE model is used to determine why the system needs to be built and what information needs to be protected

A.

Develop detailed security design

B.

Define system security requirements

C.

Discover information protection needs

D.

Define system security architecture

Full Access
Question # 19

Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary

A.

Registration Task 3

B.

Registration Task 4

C.

Registration Task 2

D.

Registration Task 1

Full Access
Question # 20

Which of the following statements is true about residual risks

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is a weakness or lack of safeguard that can be exploited by a threat.

C.

It is the probabilistic risk after implementing all security measures.

D.

It is the probabilistic risk before implementing all security measures.

Full Access
Question # 21

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

A.

Quality Assurance Manager

B.

Senior Analyst

C.

System Owner

D.

Federal program manager

Full Access
Question # 22

TQM recognizes that quality of all the processes within an organization contribute to the quality of the product. Which of the following are the most important activities in the Total Quality Management Each correct answer represents a complete solution. Choose all that apply.

A.

Quality renewal

B.

Maintenance of quality

C.

Quality costs

D.

Quality improvements

Full Access
Question # 23

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution. Choose two.

A.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

C.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

D.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

Full Access
Question # 24

Which of the following protocols is used to establish a secure terminal to a remote network device

A.

WEP

B.

SMTP

C.

SSH

D.

IPSec

Full Access
Go to page: