New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 1 Question 13 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 13
Topic #: 1
[All ISSEP Questions]

Which of the following agencies provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations?

Show Suggested Answer Hide Answer
Suggested Answer: C

The Defense Information Systems Agency is a United States Department of Defense combat support

agency with the goal of providing real-

time information technology (IT) and communications support to the President, Vice President,

Secretary of Defense, the military Services, and

the Combatant Commands.

DISA, a Combat Support Agency, engineers and provides command and control capabilities and

enterprise infrastructure to continuously

operate and assure a global net-centric enterprise in direct support to joint warfighters, National

level leaders, and other mission and coalition

partners across the full spectrum of operations.

Answer option D is incorrect. The Defense-wide Information Assurance Program (DIAP) protects and

supports DoD information, information systems, and information networks, which is important to

the Department and the armed forces throughout the day-to-day operations, and in the time of

crisis.

The DIAP uses the OSD method to plan, observe, organize, and incorporate IA activities. The role of

DIAP is to act as a facilitator for program

execution by the combatant commanders, Military Services, and Defense Agencies. The DIAP staff

combines functional and programmatic skills

for a comprehensive Defense-wide approach to IA.

The DIAP's main objective is to ensure that the DoD's vital information resources are secured and

protected by incorporating IA activities to

get a secure net-centric GIG operation enablement and information supremacy by applying a

Defense-in-Depth methodology that integrates

the capabilities of people, operations, and technology to establish a multi-layer, multidimensional

protection.

Answer option B is incorrect. The Defense Technical Information Center (DTIC) is a repository of

scientific and technical documents for the

United States Department of Defense. DTIC serves the DoD community as the largest central

resource for DoD and government-funded

scientific, technical, engineering, and business related information available today. DTIC's

documents are available to DoD personnel and

defense contractors, with unclassified documents also available to the public.

DTIC's aim is to serve a vital link in the transfer of information among DoD personnel, DoD

contractors, and potential contractors and other


Contribute your Thoughts:

0/2000 characters
Lyndia
4 months ago
I thought DTIC had more of a role in this.
upvoted 0 times
...
Melda
4 months ago
DARPA is cool, but not the right choice here.
upvoted 0 times
...
Junita
4 months ago
Wait, are we sure about DISA? Seems too broad.
upvoted 0 times
...
Maryann
4 months ago
Totally agree, DISA is crucial for joint operations.
upvoted 0 times
...
Eric
5 months ago
DISA is the right answer! They handle command and control.
upvoted 0 times
...
Avery
5 months ago
I’m not confident, but I think DIAP might be related to defense initiatives. I should have reviewed the agency functions more thoroughly.
upvoted 0 times
...
Alaine
5 months ago
I’m leaning towards DISA too, but I keep mixing it up with DARPA. I know DARPA focuses on technology development, right?
upvoted 0 times
...
Taryn
5 months ago
I feel like I saw a similar question about agency roles in a practice exam. I think DTIC is more about information and research, not command and control.
upvoted 0 times
...
Armanda
5 months ago
I think the answer might be DISA, but I'm not entirely sure. I remember it has to do with command and control capabilities.
upvoted 0 times
...
Zack
5 months ago
This is a classic man-in-the-middle attack. Eric is intercepting and relaying the communication between the two entities without their knowledge.
upvoted 0 times
...
Lorriane
5 months ago
Hmm, this looks like a tricky one. I'll need to think carefully about the Salesforce B2B Commerce objects and how they relate to accounts and price lists.
upvoted 0 times
...

Save Cancel