ISSAP Information Systems Security Architecture Professional
Last Update May 9, 2024
Total Questions : 237
We are offering FREE ISSAP ISC exam questions. All you do is to just go and sign up. Give your details, prepare ISSAP free exam questions and then go for complete pool of ISSAP Information Systems Security Architecture Professional test questions that will help you more.
Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?
Which of the following statements about Discretionary Access Control List (DACL) is true?
Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.
You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.
Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?
The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?
Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?
Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?
Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?
You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.
Which of the following algorithms can be used to check the integrity of a file?
158
Each correct answer represents a complete solution. Choose two.
Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.
You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.
You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?
You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?
Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.
The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?