Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSEP Exam Dumps - ISSEP Information Systems Security Engineering Professional

Go to page:
Question # 25

Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.

A.

Coverage

B.

Accuracy

C.

Quality

D.

Quantity

Full Access
Question # 26

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals

A.

Moderate

B.

Medium

C.

High

D.

Low

Full Access
Question # 27

Which of the following individuals is an upper-level manager who has the power and capability to evaluate the mission, business case, and budgetary needs of the system while also considering the security risks

A.

User Representative

B.

Program Manager

C.

Certifier

D.

DAA

Full Access
Question # 28

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards Each correct answer represents a complete solution. Choose all that apply.

A.

CA Certification, Accreditation, and Security Assessments

B.

Information systems acquisition, development, and maintenance

C.

IR Incident Response

D.

SA System and Services Acquisition

Full Access
Question # 29

Which of the following DoD policies establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels

A.

DoD 8500.1 Information Assurance (IA)

B.

DoD 8500.2 Information Assurance Implementation

C.

DoDI 5200.40

D.

DoD 8510.1-M DITSCAP

Full Access
Question # 30

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site

A.

ASSET

B.

NSA-IAM

C.

NIACAP

D.

DITSCAP

Full Access
Question # 31

Which of the following security controls will you use for the deployment phase of the SDLC to build secure software Each correct answer represents a complete solution. Choose all that apply.

A.

Risk Adjustments

B.

Security Certification and Accreditation (C&A)

C.

Vulnerability Assessment and Penetration Testing

D.

Change and Configuration Control

Full Access
Question # 32

Which of the following federal laws are related to hacking activities Each correct answer represents a complete solution. Choose three.

A.

18 U.S.C. 1030

B.

18 U.S.C. 1029

C.

18 U.S.C. 2510

D.

18 U.S.C. 1028

Full Access
Go to page: