New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 4 Question 4 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 4
Topic #: 4
[All ISSEP Questions]

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls?

Show Suggested Answer Hide Answer
Suggested Answer: A

Certification and accreditation (C&A) is a set of processes that culminate in an agreement between key players that a system in its current configuration and operation provides adequate protection controls.

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is

a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a

system is in operation. The C&A process is used extensively in the U.S. Federal Government. Some

C&A processes include FISMA, NIACAP, DIACAP, and DCID 6/3.

Certification is a comprehensive assessment of the management, operational, and technical security

controls in an information system, made in support of security accreditation, to determine the

extent to which the controls are implemented correctly, operating as intended, and producing the

desired outcome with respect to meeting the security requirements for the system.

Accreditation is the official management decision given by a senior agency official to authorize

operation of an information system and to explicitly accept the risk to agency operations (including

mission, functions, image, or reputation), agency assets, or individuals, based on the implementation

of an agreed-upon set of security controls.

Answer option B is incorrect. Risk management is a set of processes that ensures a risk-based

approach is used to determine adequate, cost-effective security for a system.

Answer option D is incorrect. Information assurance (IA) is the process of organizing and monitoring

information-related risks. It ensures that only the approved users have access to the approved

information at the approved time. IA practitioners seek to protect and defend information and

information systems by ensuring confidentiality, integrity, authentication, availability, and non-

repudiation. These objectives are applicable whether the information is in storage, processing, or

transit, and whether threatened by an attack.

Answer option C is incorrect. ISSE is a set of processes and solutions used during all phases of a

system's life cycle to meet the system's information protection needs.


Contribute your Thoughts:

0/2000 characters
Shaun
4 months ago
I agree with A, it's all about that certification process!
upvoted 0 times
...
Maynard
4 months ago
Wait, is C really the right answer? Sounds off to me.
upvoted 0 times
...
Titus
4 months ago
A seems right, but I wonder if D could fit too.
upvoted 0 times
...
Antonio
4 months ago
I think B is more relevant here. Risk management is key.
upvoted 0 times
...
Lashawn
5 months ago
Definitely A, that's what C&A is all about!
upvoted 0 times
...
Karon
5 months ago
I’m confused between A and C. I know ISSE involves security engineering, but does it really culminate in an agreement like C&A does?
upvoted 0 times
...
Erinn
5 months ago
I’m leaning towards D, Information Assurance, but I recall some practice questions that suggested it’s more about ongoing security rather than just an agreement on current controls.
upvoted 0 times
...
Erick
5 months ago
I remember studying Risk Management, but I feel like that focuses more on identifying and mitigating risks rather than confirming adequate controls.
upvoted 0 times
...
Luisa
5 months ago
I think the answer might be A, Certification and accreditation, but I'm not entirely sure. It seems like the right process for evaluating protection controls.
upvoted 0 times
...
Sarah
5 months ago
Hours and contract seem like the obvious choices here. I'm confident those are the two correct units for measuring entitlements.
upvoted 0 times
...
Jettie
5 months ago
This one seems pretty straightforward. I'd go with QnA Maker since it's specifically designed for creating conversational support systems from FAQ content.
upvoted 0 times
...
Annabelle
5 months ago
Hmm, this is a tricky one. There are a few different angles I could take here. I'm not totally sure which answer is the best, but I'll try to reason through it step-by-step and see if I can eliminate some of the options.
upvoted 0 times
...
Sylvie
5 months ago
I think a missing policy quarantine might stop the message from being sent, but I'm not completely sure.
upvoted 0 times
...
Elmer
5 months ago
Okay, I've got this. When the Cisco IMC is upgraded, it's the Cisco UCS Manager that gets disrupted, since the IMC and UCS Manager work closely together for server management. The other options don't seem as relevant.
upvoted 0 times
...

Save Cancel