Exam information

Exam CISSP-ISSEP: ISSEP Information Systems Security Engineering Professional

Other exams

Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed

FITSAF stands for Federal Information Technology Security Assessment Framework. It is amethodology for assessing the security of information systems. Which of the following FITSAFlevels shows that the procedures and controls are tested and reviewed

Which of the following is a type of security management for computers and networks in order to identify security breaches

Which of the following is a type of security management for computers and networks in order toidentify security breaches


Which of the following types of firewalls increases the security of data packets by remembering the state of connection…

Which of the following types of firewalls increases the security of data packets by remembering thestate of connection at the network and the session layers as they pass through the filter

Which of the following federal laws is designed to protect computer data from theft

Which of the following federal laws is designed to protect computer data from theft

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

Which of the following is used to indicate that the software has met a defined quality level and isready for mass distribution either by electronic means or by physical media

You tell her that all of the following are valid configuration management activities except for which one

Part of your change management plan details what should happen in the change control systemfor your project. Theresa, a junior project manager, asks what the configuration managementactivities are for scope changes. You tell her that all of the following are valid configurationmanagement […]

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process

Which of the following professionals is responsible for starting the Certification & Accreditation(C&A) process

Which of the following protocols is used to establish a secure terminal to a remote network device

Which of the following protocols is used to establish a secure terminal to a remote network device

Which of the following security controls is a set of layered security services that address communications…

Which of the following security controls is a set of layered security services that addresscommunications and data security problems in the emerging Internet and intranet applicationspace

Which of the following elements of Registration task 4 defines the system’s external interfaces…

Which of the following elements of Registration task 4 defines the system’s external interfaces aswell as the purpose of each external interface, and the relationship between the interface and thesystem

Page 1 of 2212345...1020...Last »