Weekend Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ISSAP Information Systems Security Architecture Professional Question and Answers

ISSAP Information Systems Security Architecture Professional

Last Update May 9, 2024
Total Questions : 237

We are offering FREE ISSAP ISC exam questions. All you do is to just go and sign up. Give your details, prepare ISSAP free exam questions and then go for complete pool of ISSAP Information Systems Security Architecture Professional test questions that will help you more.

ISSAP pdf

ISSAP PDF

$35  $99.99
ISSAP Engine

ISSAP Testing Engine

$42  $119.99
ISSAP PDF + Engine

ISSAP PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?

Options:

A.  

PPTP

B.  

UDP

C.  

IPSec

D.  

PAP

Discussion 0
Questions 2

Which of the following statements about Discretionary Access Control List (DACL) is true?

Options:

A.  

It specifies whether an audit activity should be performed when an object attempts to access a resource.

B.  

It is a unique number that identifies a user, group, and computer account.

C.  

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

D.  

It is a rule list containing access control entries.

Discussion 0
Questions 3

Which of the following schemes is used by the Kerberos authentication?

Options:

A.  

Public key cryptography

B.  

One time password

C.  

Private key cryptography

D.  

OPIE

Discussion 0
Questions 4

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

Options:

A.  

RSA

B.  

AES

C.  

ECC

D.  

DES

Discussion 0
Questions 5

You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?

Options:

A.  

PGP

B.  

SSH

C.  

DES

D.  

RC4

Discussion 0
Questions 6

You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?

Options:

A.  

Hub

B.  

Switch

C.  

Repeater

D.  

Router

Discussion 0
Questions 7

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

Options:

A.  

Service-oriented architecture

B.  

Sherwood Applied Business Security Architecture

C.  

Service-oriented modeling framework

D.  

Service-oriented modeling and architecture

Discussion 0
Questions 8

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

Options:

A.  

Data service

B.  

Ticket-granting service

C.  

Account service

D.  

Authentication service

Discussion 0
Questions 9

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Options:

A.  

Biometric device

B.  

One Time Password

C.  

Proximity cards

D.  

Security token

Discussion 0
Questions 10

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

Options:

A.  

GTC

B.  

MS-CHAP v2

C.  

AES

D.  

RC4

Discussion 0
Questions 11

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?

Options:

A.  

Project gap

B.  

Product gap

C.  

Competitive gap

D.  

Usage gap

Discussion 0
Questions 12

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

Options:

A.  

RBAC

B.  

MAC

C.  

CIA

D.  

DAC

Discussion 0
Questions 13

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

Options:

A.  

It typically executes at a higher speed than a block cipher.

B.  

It divides a message into blocks for processing.

C.  

It typically executes at a slower speed than a block cipher.

D.  

It divides a message into bits for processing.

E.  

It is a symmetric key cipher.

Discussion 0
Questions 14

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Options:

A.  

Electronic vaulting

B.  

Remote journaling

C.  

Remote mirroring

D.  

Transaction logging

Discussion 0
Questions 15

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

Options:

A.  

Critical path analysis

B.  

Functional analysis

C.  

Risk analysis

D.  

Business impact analysis

Discussion 0
Questions 16

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.  

Integrity

B.  

Accountability

C.  

Availability

D.  

Confidentiality

Discussion 0
Questions 17

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

Options:

A.  

Ring topology

B.  

Tree topology

C.  

Star topology

D.  

Mesh topology

Discussion 0
Questions 18

IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.

Options:

A.  

MD5

B.  

LEAP

C.  

AES

D.  

3DES

Discussion 0
Questions 19

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.  

Mutual

B.  

Anonymous

C.  

Multi-factor

D.  

Biometrics

Discussion 0
Questions 20

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Options:

A.  

AES

B.  

SHA

C.  

MD5

D.  

DES

Discussion 0
Questions 21

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

Options:

A.  

Storage Area network

B.  

Off-site storage

C.  

On-site storage

D.  

Network attached storage

Discussion 0
Questions 22

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.  

Authentication

B.  

Non-repudiation

C.  

Integrity

D.  

Confidentiality

Discussion 0
Questions 23

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

Options:

A.  

Policy Access Control

B.  

Mandatory Access Control

C.  

Discretionary Access Control

D.  

Role-Based Access Control

Discussion 0
Questions 24

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Options:

A.  

Implement a sign in sheet at the main entrance and route all traffic through there.

B.  

Have all people entering the building use smart cards for access.

C.  

Implement biometric access.

D.  

Implement cameras at all entrances.

Discussion 0
Questions 25

You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Layer 3

B.  

Layer 2

C.  

Layer 4

D.  

Layer 1

Discussion 0
Questions 26

Which of the following algorithms can be used to check the integrity of a file?

158

Each correct answer represents a complete solution. Choose two.

Options:

A.  

md5

B.  

rsa

C.  

blowfish

D.  

sha

Discussion 0
Questions 27

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

Options:

A.  

DES

B.  

Blowfish

C.  

RC5

D.  

Diffie-Hellman

Discussion 0
Questions 28

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.

Options:

A.  

Switch

B.  

Router

C.  

Bridge

D.  

Hub E. Repeater

Discussion 0
Questions 29

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

Options:

A.  

It represents how many times per year a specific threat occurs.

B.  

It represents the percentage of loss that an asset experiences if an anticipated threat occurs.

C.  

It is expected loss for an asset due to a risk over a one year period.

D.  

It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Discussion 0
Questions 30

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

Options:

A.  

Asymmetric

B.  

Hashing

C.  

Numeric

D.  

Symmetric

Discussion 0
Questions 31

You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?

Options:

A.  

Administrative access control

B.  

Logical access control

C.  

Physical access control

D.  

Preventive access control

Discussion 0
Questions 32

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

Options:

A.  

MD

B.  

NTLM

C.  

MAC

D.  

SHA

Discussion 0
Questions 33

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

Options:

A.  

Access control

Discussion 0
Questions 34

The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

Options:

A.  

Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.

B.  

Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.

C.  

Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.

D.  

Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.

Discussion 0
Questions 35

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Options:

A.  

PMK

B.  

PTK

C.  

PKI

D.  

GTK

Discussion 0