Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.

A.

Integrates security considerations into application and system purchasing decisions and development projects.

B.

Ensures that the necessary security controls are in place.

C.

Ensures that adequate security is being provided by the necessary controls, password management, remote access controls, operating system configurations, and so on.

D.

Ensures that the systems are properly assessed for vulnerabilities and must report any to the incident response team and data owner.

For interactive and self-paced preparation of exam ISSEP, try our practice exams.

Practice exams also include self assessment and reporting features!

Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.

A.

Netcentric

Which of the following documents is described in the statement below It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.

A.

Risk management plan

B.

Project charter

C.

Quality management plan

D.

Risk register

Della works as a systems engineer for BlueWell Inc. She wants to convert system requirements into a comprehensive function standard, and break the higher-level functions into lower-level functions. Which of the following processes will Della use to accomplish the task

A.

Risk analysis

B.

Functional allocation

C.

Functional analysis

D.

Functional baseline

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site

A.

ASSET

B.

NSA-IAM

C.

NIACAP

D.

DITSCAP

Fill in the blank with the appropriate phrase. __________ provides instructions and directions for completing the Systems Security Authorization Agreement (SSAA).

A.

DoDI 5200.40

Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk

A.

Cyber Security Tip

B.

Cyber Security Alert

C.

Cyber Security Bulletin

D.

Technical Cyber Security Alert

Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system

A.

Security Control Assessment Task 4

B.

Security Control Assessment Task 3

C.

Security Control Assessment Task 1

D.

Security Control Assessment Task 2

FIPS 199 defines the three levels of potential impact on organizations. Which of the following potential impact levels shows limited adverse effects on organizational operations, organizational assets, or individuals

A.

Moderate

B.

Medium

C.

High

D.

Low

Which of the following is the acronym of RTM

A.

Resource tracking method

B.

Requirements Testing Matrix

C.

Requirements Traceability Matrix

D.

Resource timing method