Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 1 Question 66 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 66
Topic #: 1
[All ISSEP Questions]

Which of the following is NOT used in the practice of Information Assurance (IA) to define assurance requirements

Show Suggested Answer Hide Answer
Suggested Answer: B

The types of cryptography defined by FIPS 185 are as follows:

Type I cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting classified

information.

Type II cryptography: It describes a cryptographic algorithm or a tool accepted by the National

Security Agency for protecting

sensitive, unclassified information in the systems as stated in Section 2315 of Title 10, United States

Code, or Section 3502(2) of Title

44, United States Code.

Type III cryptography: It describes a cryptographic algorithm or a tool accepted as a Federal

Information Processing Standard.

Type III (E) cryptography: It describes a Type III algorithm or a tool that is accepted for export from

the United States.


Contribute your Thoughts:

0/2000 characters
Audrie
5 months ago
I thought all of these were relevant in some way.
upvoted 0 times
...
Louvenia
5 months ago
Wait, are we sure about the Parkerian Hexad? Seems important too.
upvoted 0 times
...
Kenny
6 months ago
Totally agree, the Five Pillars model is essential for assurance!
upvoted 0 times
...
Kris
6 months ago
I think the Communications Management Plan is the odd one out.
upvoted 0 times
...
Queenie
6 months ago
Classic information security model is definitely used in IA.
upvoted 0 times
...
Ryan
6 months ago
I feel like the Five Pillars model is a common reference in IA, so it probably isn't the right choice for this question.
upvoted 0 times
...
Britt
6 months ago
The Parkerian Hexad is definitely related to IA, but I can't recall if it specifically defines assurance requirements.
upvoted 0 times
...
Jestine
6 months ago
I think the Communications Management Plan might be the answer since it seems more focused on communication rather than assurance.
upvoted 0 times
...
Dorethea
6 months ago
I remember studying the classic information security model, but I'm not sure if it's the one that doesn't define assurance requirements.
upvoted 0 times
...
Inocencia
6 months ago
Hmm, the fact that it's an unlisted company with sensitive earnings makes me think the dividend valuation model might be the most accurate approach. But I'll need to double-check the details.
upvoted 0 times
...
Domingo
6 months ago
“None of the above” seems unlikely; I think there's definitely a vulnerability with the external sanitization process. I lean towards B.
upvoted 0 times
...
Jestine
6 months ago
Hmm, this one seems tricky. I'll need to think through the key details carefully.
upvoted 0 times
...
Elenore
6 months ago
Hmm, I'm a little unsure about this one. I know it has something to do with disconnecting the session, but I'm not sure if session timeout is the right answer.
upvoted 0 times
...
Tatum
12 months ago
C) Communications Management Plan? Really? That's like asking which of these is not a vegetable - broccoli, carrot, or... refrigerator. Weird question.
upvoted 0 times
Franklyn
10 months ago
D) Parkerian Hexad
upvoted 0 times
...
Mee
10 months ago
B) Five Pillars model
upvoted 0 times
...
Julene
10 months ago
A) Classic information security model
upvoted 0 times
...
...
Laurel
12 months ago
A) Classic information security model and B) Five Pillars model sound like they could be used in IA, but C) seems out of place. I'll go with that.
upvoted 0 times
Solange
10 months ago
Let's go with C) Communications Management Plan as the answer.
upvoted 0 times
...
Louann
10 months ago
I'm not sure about D), but I'm confident that C) is not used in IA.
upvoted 0 times
...
Staci
10 months ago
I think D) Parkerian Hexad is also not used in IA.
upvoted 0 times
...
Vincenza
10 months ago
I agree, C) Communications Management Plan does seem out of place.
upvoted 0 times
...
Alfreda
10 months ago
I see your point, but I still think C) Communications Management Plan is the odd one out.
upvoted 0 times
...
Tien
10 months ago
Actually, A) Classic information security model is the one not used in IA.
upvoted 0 times
...
Kenneth
10 months ago
I think D) Parkerian Hexad is also not used in IA.
upvoted 0 times
...
Justa
10 months ago
I agree, C) Communications Management Plan doesn't seem to fit in IA.
upvoted 0 times
...
...
Genevive
12 months ago
Hmm, I was leaning towards D) Parkerian Hexad, but now I'm not so sure. This is a tricky one!
upvoted 0 times
...
Nu
1 year ago
I'm pretty sure the correct answer is C) Communications Management Plan. That's not part of the standard IA models.
upvoted 0 times
Tenesha
10 months ago
D) Parkerian Hexad is another important concept in IA.
upvoted 0 times
...
Gilma
11 months ago
B) Five Pillars model is also a common framework for IA.
upvoted 0 times
...
Cordelia
11 months ago
A) Classic information security model is definitely used in IA.
upvoted 0 times
...
Melinda
11 months ago
I think you're right, C) Communications Management Plan doesn't seem to fit with the other IA models.
upvoted 0 times
...
...
Trinidad
1 year ago
But the Communications Management Plan is more about managing communication, not defining assurance requirements.
upvoted 0 times
...
Dominga
1 year ago
I disagree, I believe it's A) Classic information security model.
upvoted 0 times
...
Trinidad
1 year ago
I think the answer is C) Communications Management Plan.
upvoted 0 times
...

Save Cancel