Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISSEP ISC ISSEP Information Systems Security Engineering Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC ISSEP ISSEP Information Systems Security Engineering Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 216 questions

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter

A.

Stateless packet filter firewall

B.

PIX firewall

C.

Stateful packet filter firewall

D.

Virtual firewall

Which of the following guidelines is recommended for engineering, protecting, managing, processing, and controlling national security and sensitive (although unclassified) information

A.

Federal Information Processing Standard (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP by the United States Department of Defense (DoD)

In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199 Each correct answer represents a complete solution. Choose all that apply.

A.

High

B.

Medium

C.

Low

D.

Moderate

Which of the following are the major tasks of risk management Each correct answer represents a complete solution. Choose two.

A.

Risk identification

B.

Building Risk free systems

C.

Assuring the integrity of organizational data

D.

Risk control

Which of the following CNSS policies describes the national policy on securing voice communications

A.

NSTISSP No. 6

B.

NSTISSP No. 7

C.

NSTISSP No. 101

D.

NSTISSP No. 200

Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS

A.

DARPA

B.

DTIC

C.

DISA

D.

DIAP

Which of the following assessment methodologies defines a six-step technical security evaluation

A.

FITSAF

B.

OCTAVE

C.

FIPS 102

D.

DITSCAP

Choose and reorder the steps to built the system security architectures in accordance with the DoDAF.

A.

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one

A.

Configuration Item Costing

B.

Configuration Identification

C.

Configuration Verification and Auditing

D.

Configuration Status Accounting

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system

A.

SSAA

B.

TCSEC

C.

FIPS

D.

FITSAF

For interactive and self-paced preparation of exam ISSEP, try our practice exams.

Practice exams also include self assessment and reporting features!

Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

A.

Netcentric

Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on World Wide Web sites, and provides guidance for doing it

A.

OMB M-99-18

B.

OMB M-00-13

C.

OMB M-03-19

D.

OMB M-00-07

Which of the following are the ways of sending secure e-mail messages over the Internet Each correct answer represents a complete solution. Choose two.

A.

PGP

B.

SMIME

C.

TLS

D.

IPSec

Which of the following federal agencies coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produces foreign intelligence information

A.

National Institute of Standards and Technology (NIST)

B.

National Security AgencyCentral Security Service (NSACSS)

C.

Committee on National Security Systems (CNSS)

D.

United States Congress

Which of the following phases of the ISSE model is used to determine why the system needs to be built and what information needs to be protected

A.

Develop detailed security design

B.

Define system security requirements

C.

Discover information protection needs

D.

Define system security architecture

Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities

A.

Advisory memoranda

B.

Directives

C.

Instructions

D.

Policies

Which of the following policies describes the national policy on the secure electronic messaging service

A.

NSTISSP No. 11

B.

NSTISSP No. 7

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism

A.

Internet Key Exchange (IKE) Protocol

B.

SMIME

C.

Internet Protocol Security (IPSec)

D.

Secure Socket Layer (SSL)

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information

A.

Type III cryptography

B.

Type III (E) cryptography

C.

Type II cryptography

D.

Type I cryptography

Which of the following acts assigns the Chief Information Officers (CIO) with the responsibility to develop Information Technology Architectures (ITAs) and is also referred to as the Information Technology Management Reform Act (ITMRA)

A.

Paperwork Reduction Act

B.

Computer Misuse Act

C.

Lanham Act

D.

Clinger Cohen Act

Page: 2 / 4
Total 216 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved