New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 1 Question 66 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 66
Topic #: 1
[All ISSEP Questions]

Which of the following is NOT used in the practice of Information Assurance (IA) to define assurance requirements

Show Suggested Answer Hide Answer
Suggested Answer: B

The types of cryptography defined by FIPS 185 are as follows:

Type I cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting classified

information.

Type II cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting

sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States

Code, or Section 3502(2) of Title

44, United States Code.

Type III cryptography: It describes a cryptographic algorithm or a tool accepted as a Federal

Information Processing Standard.

Type III (E) cryptography: It describes a Type III algorithm or a tool that is accepted for export from

the United States.


Contribute your Thoughts:

0/2000 characters
Audrie
4 months ago
I thought all of these were relevant in some way.
upvoted 0 times
...
Louvenia
4 months ago
Wait, are we sure about the Parkerian Hexad? Seems important too.
upvoted 0 times
...
Kenny
4 months ago
Totally agree, the Five Pillars model is essential for assurance!
upvoted 0 times
...
Kris
4 months ago
I think the Communications Management Plan is the odd one out.
upvoted 0 times
...
Queenie
4 months ago
Classic information security model is definitely used in IA.
upvoted 0 times
...
Ryan
5 months ago
I feel like the Five Pillars model is a common reference in IA, so it probably isn't the right choice for this question.
upvoted 0 times
...
Britt
5 months ago
The Parkerian Hexad is definitely related to IA, but I can't recall if it specifically defines assurance requirements.
upvoted 0 times
...
Jestine
5 months ago
I think the Communications Management Plan might be the answer since it seems more focused on communication rather than assurance.
upvoted 0 times
...
Dorethea
5 months ago
I remember studying the classic information security model, but I'm not sure if it's the one that doesn't define assurance requirements.
upvoted 0 times
...
Inocencia
5 months ago
Hmm, the fact that it's an unlisted company with sensitive earnings makes me think the dividend valuation model might be the most accurate approach. But I'll need to double-check the details.
upvoted 0 times
...
Domingo
5 months ago
“None of the above” seems unlikely; I think there's definitely a vulnerability with the external sanitization process. I lean towards B.
upvoted 0 times
...
Jestine
5 months ago
Hmm, this one seems tricky. I'll need to think through the key details carefully.
upvoted 0 times
...
Elenore
5 months ago
Hmm, I'm a little unsure about this one. I know it has something to do with disconnecting the session, but I'm not sure if session timeout is the right answer.
upvoted 0 times
...
Tatum
10 months ago
C) Communications Management Plan? Really? That's like asking which of these is not a vegetable - broccoli, carrot, or... refrigerator. Weird question.
upvoted 0 times
Franklyn
8 months ago
D) Parkerian Hexad
upvoted 0 times
...
Mee
9 months ago
B) Five Pillars model
upvoted 0 times
...
Julene
9 months ago
A) Classic information security model
upvoted 0 times
...
...
Laurel
10 months ago
A) Classic information security model and B) Five Pillars model sound like they could be used in IA, but C) seems out of place. I'll go with that.
upvoted 0 times
Solange
8 months ago
Let's go with C) Communications Management Plan as the answer.
upvoted 0 times
...
Louann
8 months ago
I'm not sure about D), but I'm confident that C) is not used in IA.
upvoted 0 times
...
Staci
8 months ago
I think D) Parkerian Hexad is also not used in IA.
upvoted 0 times
...
Vincenza
8 months ago
I agree, C) Communications Management Plan does seem out of place.
upvoted 0 times
...
Alfreda
8 months ago
I see your point, but I still think C) Communications Management Plan is the odd one out.
upvoted 0 times
...
Tien
8 months ago
Actually, A) Classic information security model is the one not used in IA.
upvoted 0 times
...
Kenneth
8 months ago
I think D) Parkerian Hexad is also not used in IA.
upvoted 0 times
...
Justa
8 months ago
I agree, C) Communications Management Plan doesn't seem to fit in IA.
upvoted 0 times
...
...
Genevive
10 months ago
Hmm, I was leaning towards D) Parkerian Hexad, but now I'm not so sure. This is a tricky one!
upvoted 0 times
...
Nu
11 months ago
I'm pretty sure the correct answer is C) Communications Management Plan. That's not part of the standard IA models.
upvoted 0 times
Tenesha
9 months ago
D) Parkerian Hexad is another important concept in IA.
upvoted 0 times
...
Gilma
9 months ago
B) Five Pillars model is also a common framework for IA.
upvoted 0 times
...
Cordelia
9 months ago
A) Classic information security model is definitely used in IA.
upvoted 0 times
...
Melinda
10 months ago
I think you're right, C) Communications Management Plan doesn't seem to fit with the other IA models.
upvoted 0 times
...
...
Trinidad
11 months ago
But the Communications Management Plan is more about managing communication, not defining assurance requirements.
upvoted 0 times
...
Dominga
11 months ago
I disagree, I believe it's A) Classic information security model.
upvoted 0 times
...
Trinidad
11 months ago
I think the answer is C) Communications Management Plan.
upvoted 0 times
...

Save Cancel