ISC2 Information Systems Security Engineering Professional ISSEP CISSP-ISSEP Exam Practice Test

Page: 1 / 14
Total 214 questions
Question 1

Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.



Answer : C, D


Question 2

Which of the following cooperative programs carried out by NIST encourages performance excellence among U.S. manufacturers, service companies, educational institutions, and healthcare providers



Answer : B


Question 3

Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation



Answer : D


Question 4

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information



Answer : D


Question 5

Which of the following federal laws establishes roles and responsibilities for information security, risk management, testing, and training, and authorizes NIST and NSA to provide guidance for security planning and implementation



Answer : B


Question 6

Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions



Answer : B


Question 7

Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developed



Answer : A


Page:    1 / 14   
Total 214 questions