ISC Information Systems Security Engineering Professional CISSP-ISSEP Exam Questions in PDF

Free ISC CISSP-ISSEP Dumps Questions (page: 4)

Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?

  1. Computer Misuse Act
  2. Clinger-Cohen Act
  3. ISG
  4. Lanham Act

Answer(s): C



You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities.
For your project archives, which one of the following is an output of risk monitoring and control?

  1. Quantitative risk analysis
  2. Risk audits
  3. Requested changes
  4. Qualitative risk analysis

Answer(s): C



Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

  1. DAS
  2. IDS
  3. ACL
  4. Ipsec

Answer(s): B



You work as a systems engineer for BlueWell Inc. You want to communicate the quantitative and qualitative system characteristics to all stakeholders. Which of the following documents will you use to achieve the above task?

  1. IMM
  2. CONOPS
  3. IPP
  4. System Security Context

Answer(s): B



Which of the following organizations is a USG initiative designed to meet the security testing, evaluation, and assessment needs of both information technology (IT) producers and consumers?

  1. NSA
  2. NIST
  3. CNSS
  4. NIAP

Answer(s): D



Which of the following terms describes the security of an information system against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users or the provision of service to unauthorized users?

  1. Information Assurance (IA)
  2. Information Systems Security Engineering (ISSE)
  3. Information Protection Policy (IPP)
  4. Information systems security (InfoSec)

Answer(s): D



The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series?
Each correct answer represents a complete solution. Choose all that apply.

  1. Providing IA Certification and Accreditation
  2. Providing command and control and situational awareness
  3. Defending systems
  4. Protecting information

Answer(s): B,C,D



Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space?

  1. Internet Protocol Security (IPSec)
  2. Common data security architecture (CDSA)
  3. File encryptors
  4. Application program interface (API)

Answer(s): B



Share your comments for ISC CISSP-ISSEP exam with other users:

S
srameh
4/14/2026 10:09:29 AM

Question 3:

  • Correct answer: Phase 4, Post Accreditation

  • Explanation:
- In DITSCAP, the four phases are: - Phase 1: Definition (concept and requirements) - Phase 2: Verification (design and testing) - Phase 3: Validation (fielding and evaluation) - Phase 4: Post Accreditation (ongoing operations and lifecycle management) - The description—continuing operation of an accredited IT system and addressing changing threats throughout its life cycle—fits the Post Accreditation phase, which covers operations, maintenance, monitoring, and reauthorization as threats and environment evolve.

AI Tutor 👋 I’m here to help!