Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISSEP ISC ISSEP Information Systems Security Engineering Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC ISSEP ISSEP Information Systems Security Engineering Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 216 questions

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems

A.

NIST Special Publication 800-59

B.

NIST Special Publication 800-37

C.

NIST Special Publication 800-60

D.

NIST Special Publication 800-53

Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy

A.

Networks and Infrastructures

B.

Supporting Infrastructures

C.

Enclave Boundaries

D.

Local Computing Environments

Which of the following tools demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators

A.

ISO 90012000

B.

Benchmarking

C.

SEI-CMM

D.

Six Sigma

Which of the of following departments protects and supports DoD information, information systems, and information networks that are critical to the department and the armed forces during the day-to-day operations, and in the time of crisis

A.

DIAP

B.

DARPA

C.

DTIC

D.

DISA

Which of the following roles is also known as the accreditor

A.

Data owner

B.

Chief Information Officer

C.

Chief Risk Officer

D.

Designated Approving Authority

You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process

A.

Design information systems that will meet the certification and accreditation documentation.

B.

Identify the information protection needs.

C.

Ensure information systems are designed and developed with functional relevance.

D.

Instruct systems engineers on availability, integrity, and confidentiality.

Fill in the blank with an appropriate phrase. The ____________ helps the customer understand and document the information management needs that support the business or mission.

A.

systems engineer

Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.

A.

Coverage

B.

Accuracy

C.

Quality

D.

Quantity

Which of the following DoD policies establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels

A.

DoD 8500.1 Information Assurance (IA)

B.

DoD 8500.2 Information Assurance Implementation

C.

DoDI 5200.40

D.

DoD 8510.1-M DITSCAP

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

A.

NSTISSP No. 7

B.

NSTISSP No. 11

C.

NSTISSP No. 6

D.

NSTISSP No. 101

The risk transference is referred to the transfer of risks to a third party, usually for a fee, it creates a contractual-relationship for the third party to manage the risk on behalf of the performing organization. Which one of the following is NOT an example of the transference risk response

A.

Warranties

B.

Performance bonds

C.

Use of insurance

D.

Life cycle costing

Which of the following is NOT an objective of the security program

A.

Security education

B.

Information classification

C.

Security organization

D.

Security plan

Which of the following NIST documents describes that minimizing negative impact on an organization and a need for sound basis in decision making are the fundamental reasons organizations implement a risk management process for their IT systems

A.

NIST SP 800-37

B.

NIST SP 800-30

C.

NIST SP 800-53

D.

NIST SP 800-60

Which of the following Net-Centric Data Strategy goals are required to increase enterprise and community data over private user and system data Each correct answer represents a complete solution. Choose all that apply.

A.

Understandability

B.

Visibility

C.

Interoperability

D.

Accessibility

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event

A.

Acceptance

B.

Enhance

C.

Share

D.

Exploit

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability

A.

MAC I

B.

MAC II

C.

MAC III

D.

MAC IV

Which of the following is a 1996 United States federal law, designed to improve the way the federal government acquires, uses, and disposes information technology

A.

Lanham Act

B.

Clinger-Cohen Act

C.

Computer Misuse Act

D.

Paperwork Reduction Act

Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.

A.

Right-Up Approach

B.

Left-Up Approach

C.

Bottom-Up Approach

D.

Top-Down Approach

What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.

A.

Integrates security considerations into application and system purchasing decisions and development projects.

B.

Ensures that the necessary security controls are in place.

C.

Ensures that adequate security is being provided by the necessary controls, password management, remote access controls, operating system configurations, and so on.

D.

Ensures that the systems are properly assessed for vulnerabilities and must report any to the incident response team and data owner.

FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high. Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level potential impact

A.

The loss of confidentiality, integrity, or availability might cause severe degradation in or loss of mission capability to an extent.

B.

The loss of confidentiality, integrity, or availability might result in major financial losses.

C.

The loss of confidentiality, integrity, or availability might result in a major damage to organizational assets.

D.

The loss of confidentiality, integrity, or availability might result in severe damages like life threatening injuries or loss of life.

Page: 1 / 4
Total 216 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved