New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 2 Question 58 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 58
Topic #: 2
[All ISSEP Questions]

Which of the following CNSS policies describes the national policy on securing voice

communications?

Show Suggested Answer Hide Answer
Suggested Answer: C

The various CNSS policies are as follows:

NSTISSP No. 6: It describes the national policy on certification and accreditation of national security

telecommunications and

information systems.

NSTISSP No. 7: It describes the national policy on secure electronic messaging service.

NSTISSP No. 11: It describes the national policy governing the acquisition of information assurance

(IA) and IA-enabled Information

Technology (IT) products.

NSTISSP No. 101: It describes the national policy on securing voice communications.

NSTISSP No. 200: It describes the national policy on controlled access protection.

CNSSP No. 14: It describes the national policy governing the release of information assurance

products and services to authorized U.S.

persons or activities that are not a part of the federal government.

NCSC No. 5: It describes the national policy on use of cryptomaterial by activities operating in high

risk environments.


Contribute your Thoughts:

0/2000 characters
Yuki
4 months ago
I agree with Gilma, No. 6 is the one!
upvoted 0 times
...
Arlie
4 months ago
Wait, is there really a policy for voice comms? Sounds odd.
upvoted 0 times
...
Nada
4 months ago
Definitely No. 101!
upvoted 0 times
...
Chun
4 months ago
I thought it was No. 7, but I could be wrong.
upvoted 0 times
...
Gilma
4 months ago
Pretty sure it's NSTISSP No. 6.
upvoted 0 times
...
Sharita
5 months ago
I thought NSTISSP No. 101 dealt with information assurance, but I might be mixing it up with another policy.
upvoted 0 times
...
Lashon
5 months ago
I feel like NSTISSP No. 200 was mentioned in our last review session, but I can't connect it to voice communications.
upvoted 0 times
...
Dong
5 months ago
I remember studying NSTISSP No. 7 for a similar question, but I can't recall if it specifically covers voice security.
upvoted 0 times
...
Marti
5 months ago
I think NSTISSP No. 6 might be the one related to securing voice communications, but I'm not entirely sure.
upvoted 0 times
...
Ernie
5 months ago
I'm pretty confident that C is the most accurate statement about pay grades and bands. They can definitely overlap between adjacent grades.
upvoted 0 times
...
Valentine
5 months ago
This question seems straightforward, but I want to make sure I understand the key details before selecting an answer.
upvoted 0 times
...
Viola
5 months ago
This is a tricky one, but I think the key is in the difference between the metrics used by the custom monitoring tool and the CloudWatch alarms. The question mentions "DiskReadBytes" and "DiskWriteBytes", while the options talk about "VolumeReadBytes" and "VolumeWriteBytes". I'll go with option C to reconfigure the alarms to use the correct metrics.
upvoted 0 times
...
Madelyn
5 months ago
I'm leaning towards option D, but I can't quite recall if PSN is always the right place to enable device services.
upvoted 0 times
...
Magdalene
5 months ago
Okay, I've got this. The key is to make sure I add the Developer tab to the ribbon first, then I can record the macro and insert the sheet name and page number. I've done this before, so I feel confident.
upvoted 0 times
...

Save Cancel