Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

ISC ISSEP Exam - Cheat-Test.com

Free ISSEP Sample Questions:

Q: 1
Fill in the blank with an appropriate phrase. The helps the customer understand and document the information management needs that support the business or mission.
A. The systems engineer helps the customer understand and document the information management needs that support the business or mission.
Answer: A

Q: 2
Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?
A. Information systems security engineering (ISSE)
B: Certification and accreditation (C&A)
C. Risk Management
D. Information Assurance (IA)
Answer: B

Q: 3
You work as a systems engineer for BlueWell Inc. You want to communicate the quantitative and qualitative system characteristics to all stakeholders. Which of the following documents will you use to achieve the above task?
A. IPP
B. IMM
C. System Security Context
D. CONOPS
Answer: D

Q: 4
You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process?
A. Ensure information systems are designed and developed with functional relevance.
B. Instruct systems engineers on availability, integrity, and confidentiality.
C. Design information systems that will meet the certification and accreditation documentation.
D. Identify the information protection needs.
Answer: D

Q: 5
Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk?
A. Cyber Security Tip
B. Cyber Security Bulletin
C. Technical Cyber Security Alert
D. Cyber Security Alert
Answer: B

Q: 6
Drag and drop the correct DoD Policy Series at their appropriate places.
DoD Policy SeriesPolicy Subject Area
8500General
8510IA Certification and Accreditation
8520Security Management
8530Computer Network Defense
8540Interconnectivity
8550Network and Web
8560IA Monitoring
8570IA Education, Training, and Awareness
8580Other (Integration)
A.
Drop Here8540
Drop Here8570
Drop Here8530
Drop Here8520
Drop Here8510
Drop Here8500
Answer: A

Q: 7
You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process?
A. Acquisition plan
B. Transition plan
C. Systems engineering management plan (SEMP)
D. Configuration management plan
Answer: B

Q: 8
Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A)? Each correct answer represents a complete solution. Choose all that apply.
A. NIST Special Publication 800-53
B. NIST Special Publication 800-59
C. NIST Special Publication 800-37A
D. NIST Special Publication 800-60
E. NIST Special Publication 800-53A
F. NIST Special Publication 800-37
Answer: F, A, E, B, D

Q: 9
Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will Della use to accomplish the task?
A. Risk analysis
B. Functional allocation
C. Functional analysis
D. Functional baseline
Answer: C

Q: 10
Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented?
A. Configuration verification and audit
B. Configuration identification
C. Configuration control
D. Configuration status accounting
Answer: B

Q: 11
Which of the following describes residual risk as the risk remaining after risk mitigation has occurred?
A. DAA
B. ISSO
C. SSAA
D. DIACAP
Answer: D

Q: 12
Which of the following refers to a process that is used for implementing information security?
A. Classic information security model
B. Information Assurance (IA)
C. Certification and Accreditation (C&A)
D. Five Pillars model
Answer: C

Q: 13
Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available?
A. Configuration Identification
B. Configuration Control
C. Configuration Status and Accounting
D. Configuration Verification and Audit
Answer: C

Q: 14
You work as a systems engineer for BlueWell Inc. You want to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Which of the following processes will you use to accomplish the task?
A. Risk Analysis
B. Risk Management
C. Information Assurance (IA)
D. Information Systems Security Engineering (ISSE)
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved