The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.
A. An ISSE manages the security of the information system that is slated for Certification and Accreditation (CandA).
B. An ISSE provides advice on the continuous monitoring of the information system.
C. An ISSO manages the security of the information system that is slated for Certification and Accreditation (CandA).
D. An ISSE provides advice on the impacts of system changes. E. An ISSO takes part in the development activities that are required to implement system changes.
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.
A. Physical
B. Technical
C. Administrative
D. Automatic
Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?
A. Mitigation
B. Transference
C. Acceptance
D. Avoidance
You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project. Which of the following procedures of the configuration management will you follow to accomplish the task?
A. Configuration status accounting
B. Configuration control
C. Configuration audits
D. Configuration identification
Which of the following scanning techniques helps to ensure that the standard software configuration is currently with the latest security patches and software, and helps to locate uncontrolled or unauthorized software?
A. Port Scanning
B. Discovery Scanning
C. Server Scanning
D. Workstation Scanning
Which of the following techniques is used to identify attacks originating from a botnet?
A. Passive OS fingerprinting
B. Recipient filtering
C. IFilter
D. BPF-based filter
You work as a Security Manager for Tech Perfect Inc. The company has a Windows based network. It is required to determine compatibility of the systems with custom applications. Which of the following techniques will you use to accomplish the task?
A. Safe software storage
B. Antivirus management
C. Backup control
D. Software testing
What NIACAP certification levels are recommended by the certifier? Each correct answer represents a complete solution. Choose all that apply.
A. Comprehensive Analysis
B. Maximum Analysis
C. Detailed Analysis
D. Minimum Analysis
E. Basic Security Review
F. Basic System Review
John works as a systems engineer for BlueWell Inc. He has modified the software, and wants to retest the application to ensure that bugs have been fixed or not. Which of the following tests should John use to accomplish the task?
A. Reliability test
B. Functional test
C. Performance test
D. Regression test
Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality?
A. Information Protection Policy (IPP)
B. IMM
C. System Security Context
D. CONOPS