Pass the ISC ISC certification ISSEP Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation

Options:

A.

Chief Information Officer


B.

Chief Information Security Officer


C.

Chief Risk Officer


D.

Information System Owner


Expert Solution
Questions # 32:

Which of the following refers to a process that is used for implementing information security

Options:

A.

Classic information security model


B.

Certification and Accreditation (C&A)


C.

Information Assurance (IA)


D.

Five Pillars model


Expert Solution
Questions # 33:

Which of the following are the benefits of SE as stated by MIL-STD-499B Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It develops work breakdown structures and statements of work.


B.

It establishes and maintains configuration management of the system.


C.

It develops needed user training equipment, procedures, and data.


D.

It provides high-quality products and services, with the correct people and performance features, at an affordable price, and on time.


Expert Solution
Questions # 34:

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system

Options:

A.

System Owner


B.

Information Systems Security Officer (ISSO)


C.

Designated Approving Authority (DAA)


D.

Chief Information Security Officer (CISO)


Expert Solution
Questions # 35:

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship

Options:

A.

FIPS 200


B.

NIST SP 800-50


C.

Traceability matrix


D.

FIPS 199


Expert Solution
Questions # 36:

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available

Options:

A.

Configuration Identification


B.

Configuration Verification and Audit


C.

Configuration Status and Accounting


D.

Configuration Control


Expert Solution
Questions # 37:

Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It performs vulnerabilitythreat analysis assessment.


B.

It provides for entry and storage of individual system data.


C.

It provides data needed to accurately assess IA readiness.


D.

It identifies and generates IA requirements.


Expert Solution
Questions # 38:

Which of the following policies describes the national policy on the secure electronic messaging service

Options:

A.

NSTISSP No. 11


B.

NSTISSP No. 7


C.

NSTISSP No. 6


D.

NSTISSP No. 101


Expert Solution
Questions # 39:

Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States

Options:

A.

Lanham Act


B.

FISMA


C.

Computer Fraud and Abuse Act


D.

Computer Misuse Act


Expert Solution
Questions # 40:

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions

Options:

A.

DTIC


B.

NSA IAD


C.

DIAP


D.

DARPA


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions