Pass the ISC ISC certification ISSEP Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

John works as a security engineer for BlueWell Inc. He wants to identify the different functions that the system will need to perform to meet the documented missionbusiness needs. Which of the following processes will John use to achieve the task

Options:

A.

Modes of operation


B.

Performance requirement


C.

Functional requirement


D.

Technical performance measures


Expert Solution
Questions # 42:

Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network-centric warfare

Options:

A.

DoD 8500.2 Information Assurance Implementation


B.

DoD 8510.1-M DITSCAP


C.

DoDI 5200.40


D.

DoD 8500.1 Information Assurance (IA)


Expert Solution
Questions # 43:

Which of the following terms describes the measures that protect and support information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Options:

A.

Information Systems Security Engineering (ISSE)


B.

Information Protection Policy (IPP)


C.

Information systems security (InfoSec)


D.

Information Assurance (IA)


Expert Solution
Questions # 44:

Which of the following tasks describes the processes required to ensure that the project includes all the work required, and only the work required, to complete the project successfully

Options:

A.

Identify Roles and Responsibilities


B.

Develop Project Schedule


C.

Identify Resources and Availability


D.

Estimate project scope


Expert Solution
Questions # 45:

Choose and reorder the security certification document tasks.

Options:

A.

Expert Solution
Questions # 46:

Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist

Options:

A.

CL 2


B.

CL 3


C.

CL 1


D.

CL 4


Expert Solution
Questions # 47:

Which of the following acts assigns the Chief Information Officers (CIO) with the responsibility to develop Information Technology Architectures (ITAs) and is also referred to as the Information Technology Management Reform Act (ITMRA)

Options:

A.

Paperwork Reduction Act


B.

Computer Misuse Act


C.

Lanham Act


D.

Clinger Cohen Act


Expert Solution
Questions # 48:

What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Integrates security considerations into application and system purchasing decisions and development projects.


B.

Ensures that the necessary security controls are in place.


C.

Ensures that adequate security is being provided by the necessary controls, password management, remote access controls, operating system configurations, and so on.


D.

Ensures that the systems are properly assessed for vulnerabilities and must report any to the incident response team and data owner.


Expert Solution
Questions # 49:

You work as an ISSE for BlueWell Inc. You want to break down user roles, processes, and information until ambiguity is reduced to a satisfactory degree. Which of the following tools will help you to perform the above task

Options:

A.

PERT Chart


B.

Gantt Chart


C.

Functional Flow Block Diagram


D.

Information Management Model (IMM)


Expert Solution
Questions # 50:

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process

Options:

A.

Authorizing Official


B.

Information system owner


C.

Chief Information Officer (CIO)


D.

Chief Risk Officer (CRO)


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions