Free Practice Test

Free CISSP-ISSEP Practice Test

Prepare smarter for your CISSP-ISSEP exam with our free, accurate, and 2025-updated questions.

At Cert Empire, we are committed to providing the best and the latest exam questions to the aspiring students who are preparing for ISC2 CISSP-ISSEP Exam. To help the students prepare better, we have made sections of our CISSP-ISSEP exam preparation resources free for all. You can practice as much as you can with Free CISSP-ISSEP Practice Test.

ISC2 CISSP-ISSEP Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 60

Stella works as a system engineer for BlueWell Inc. She wants to identify the performance thresholds of each build. Which of the following tests will help Stella to achieve her task.

2 / 60

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using.

3 / 60

SIMULATION -
Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement
(SSAA).

4 / 60

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems.

5 / 60

SIMULATION -
For interactive and self-paced preparation of exam ISSEP, try our practice exams. Practice exams also include self assessment and reporting features!
Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

6 / 60

Which of the following is a document, usually in the form of a table, that correlates any two baseline documents that require a many-to-many relationship to determine the completeness of the relationship.

7 / 60

Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the primary network layer protection mechanism.

8 / 60

Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks.

9 / 60

Which of the following configuration management system processes keeps track of the changes so that the latest acceptable configuration specifications are readily available.

10 / 60

SIMULATION -
Fill in the blank with the appropriate phrase. The ____________ is the risk that remains after the implementation of new or enhanced controls.

11 / 60

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet.

12 / 60

You work as a security engineer for BlueWell Inc. You are working on the ISSE model. In which of the following phases of the ISSE model is the system defined in terms of what security is needed.

13 / 60

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors.

14 / 60

You work as a Network Administrator for PassGuide Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security.

15 / 60

SIMULATION -
Fill in the blank with an appropriate phrase. __________ seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes.

16 / 60

You work as a systems engineer for BlueWell Inc. You are working on translating system requirements into detailed function criteria. Which of the following diagrams will help you to show all of the function requirements and their groupings in one diagram.

17 / 60

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle.

18 / 60

You work as a security manager for BlueWell Inc. You are going through the NIST SP 800-37 C&A methodology, which is based on four well defined phases. In which of the following phases of NIST SP 800-37 C&A methodology does the security categorization occur.

19 / 60

Lisa is the project manager of the SQL project for her company. She has completed the risk response planning with her project team and is now ready to update the risk register to reflect the risk response. Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created.

20 / 60

Which of the following memorandums reminds the Federal agencies that it is required by law and policy to establish clear privacy policies for Web activities and to comply with those policies.

21 / 60

SIMULATION -
Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.

22 / 60

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system.

23 / 60

You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process.

24 / 60

Which of the following agencies serves the DoD community as the largest central resource for DoD and government-funded scientific, technical, engineering, and business related information available today.

25 / 60

Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management.

26 / 60

In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47, do the organizations build and execute a plan for establishing the interconnection, including executing or configuring appropriate security controls.

27 / 60

Which of the following tools demands involvement by upper executives, in order to integrate quality into the business system and avoid delegation of quality functions to junior administrators.

28 / 60

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response.

29 / 60

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

30 / 60

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet.

31 / 60

Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems.

32 / 60

Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk.

33 / 60

Which of the following guidelines is recommended for engineering, protecting, managing, processing, and controlling national security and sensitive (although unclassified) information.

34 / 60

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process.

35 / 60

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space.

36 / 60

Which of the following protocols is used to establish a secure terminal to a remote network device.

37 / 60

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one.

38 / 60

Which of the following is a type of security management for computers and networks in order to identify security breaches.

39 / 60

Which of the following federal laws is designed to protect computer data from theft.

40 / 60

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed.

41 / 60

Which of the following assessment methodologies defines a six-step technical security evaluation.

42 / 60

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure.

43 / 60

Which of the following policies describes the national policy on the secure electronic messaging service.

44 / 60

You work as a system engineer for BlueWell Inc. You want to verify that the build meets its data requirements, and correctly generates each expected display and report. Which of the following tests will help you to perform the above task.

45 / 60

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors.

46 / 60

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats.

47 / 60

Which of the following refers to a process that is used for implementing information security.

48 / 60

You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems.

49 / 60

Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented.

50 / 60

Which of the following statements is true about residual risks.

51 / 60

Which of the following Registration Tasks sets up the business or operational functional description and system identification.

52 / 60

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability.

53 / 60

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality.

54 / 60

Which of the following tasks obtains the customer agreement in planning the technical effort.

55 / 60

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls.

56 / 60

Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system.

57 / 60

Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system.

58 / 60

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process.

59 / 60

Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter.

60 / 60

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media.

Your score is

The average score is 83%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE