Questions for the ISSEP were updated on : Dec 14 ,2025
Which of the following CNSS policies describes the national policy on controlled access protection
B
Which of the following organizations incorporates building secure audio and video communications
equipment, making tamper protection products, and providing trusted microelectronics solutions
B
Continuous Monitoring is the fourth phase of the security certification and accreditation process.
What activities are performed in the Continuous Monitoring process Each correct answer represents
a complete solution. Choose all that apply.
C,B,A
You are working as a project manager in your organization. You are nearing the final stages of project
execution and looking towards the final risk monitoring and controlling activities. For your project
archives, which one of the following is an output of risk monitoring and control
C
Which of the following are the major tasks of risk management Each correct answer represents a
complete solution. Choose two.
A,D
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic
algorithm or a tool accepted by the National Security Agency for protecting classified information
D
Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities
D
Which of the following security controls will you use for the deployment phase of the SDLC to build
secure software Each correct answer represents a complete solution. Choose all that apply.
C,B,A
Registration Task 5 identifies the system security requirements. Which of the following elements of
Registration Task 5 defines the type of data processed by the system
A
John works as a security engineer for BlueWell Inc. He wants to identify the different functions that
the system will need to perform to meet the documented missionbusiness needs. Which of the
following processes will John use to achieve the task
C
Which of the following requires all general support systems and major applications to be fully
certified and accredited before these systems and applications are put into production Each correct
answer represents a part of the solution. Choose all that apply.
C,
Which of the following are the benefits of SE as stated by MIL-STD-499B Each correct answer
represents a complete solution. Choose all that apply.
C,B,A
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic
algorithm or a tool accepted as a Federal Information Processing Standard
B
Which of the following are the functional analysis and allocation tools Each correct answer
represents a complete solution. Choose all that apply.
D, A,C
Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD
IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and
technology, and supports the evolution to network-centric warfare
D