Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 1 Question 80 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 80
Topic #: 1
[All ISSEP Questions]

You work as a systems engineer for BlueWell Inc. You want to protect and defend information and

information systems by ensuring their availability, integrity, authentication, confidentiality, and non-

repudiation. Which of the following processes will you use to accomplish the task?

Show Suggested Answer Hide Answer
Suggested Answer: A

Information assurance (IA) is the process of organizing and monitoring information-related risks. It

ensures that only the approved users have

access to the approved information at the approved time. IA practitioners seek to protect and

defend information and information systems by

ensuring confidentiality, integrity, authentication, availability, and non-repudiation. These objectives

are applicable whether the information is

in storage, processing, or transit, and whether threatened by an attack.

Answer option D is incorrect. ISSE is a set of processes and solutions used during all phases of a

system's life cycle to meet the system's

information protection needs.

Answer option C is incorrect. Risk analysis is the science of risks and their probability and evaluation

in a business or a process. It is an

important factor in security enhancement and prevention in a system. Risk analysis should be

performed as part of the risk management

process for each project. The outcome of the risk analysis would be the creation or review of the risk

register to identify and quantify risk

elements to the project and their potential impact.

Answer option B is incorrect. Risk management is a set of processes that ensures a risk-based

approach is used to determine adequate, cost-

effective security for a system.


Contribute your Thoughts:

Carlee
6 months ago
Authentication is also crucial to ensure only authorized users can access the information.
upvoted 0 times
...
Delfina
7 months ago
That's a good point, access control is essential for protecting information systems.
upvoted 0 times
...
Lynelle
7 months ago
But don't forget about access control measures to ensure confidentiality.
upvoted 0 times
...
Phyliss
7 months ago
I agree with Delfina, encryption will help protect the information.
upvoted 0 times
...
Delfina
7 months ago
I think the process we should use is encryption.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77