Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! CISSP-ISSAP has been withdrawn.

CISSP-ISSAP Practice Exam Questions with Answers ISSAP Information Systems Security Architecture Professional Certification

Question # 6

Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.

A.

Strikes

B.

Floods

C.

Accidents

D.

Storms

Full Access
Question # 7

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

A.

WEP

B.

IPsec

C.

VPN

D.

SSL

Full Access
Question # 8

You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?

A.

Photoelectric motion detector

B.

Badge

C.

Closed-circuit television

D.

Alarm

Full Access
Question # 9

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

A.

Pairwise Transient Key

B.

Group Temporal Key

C.

Private Key

D.

Pairwise Master Key

Full Access
Question # 10

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

A.

Block cipher

B.

Stream cipher

C.

Transposition cipher

D.

Message Authentication Code

Full Access
Question # 11

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.

A.

It relies upon a system of security associations.

B.

It provides key generation mechanisms.

C.

It authenticates communicating peers.

D.

It protects against threats, such as DoS attack, replay attack, etc.

Full Access
Question # 12

Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

A.

Block cipher

B.

Classical cipher

C.

Substitution cipher

D.

Stream cipher

Full Access
Question # 13

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

A.

Power Surge

B.

Power Spike

C.

Blackout

D.

Brownout

Full Access
Question # 14

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.

TRACERT

B.

PING

C.

IPCONFIG

D.

NSLOOKUP

Full Access
Question # 15

Which of the following firewalls inspects the actual contents of packets?

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Full Access
Question # 16

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

A.

Line Conditioner

B.

Surge Suppressor

C.

Uninterrupted Power Supply (UPS)

D.

Expansion Bus

Full Access
Question # 17

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

A.

Ring topology

B.

Tree topology

C.

Star topology

D.

Mesh topology

Full Access
Question # 18

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

A.

TACACS

B.

S-RPC

C.

RADIUS

D.

CHAP

Full Access
Question # 19

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

A.

Cipher feedback mode

B.

Cipher block chaining mode

C.

Output feedback mode

D.

Electronic codebook mode

Full Access
Question # 20

Which of the following types of firewall functions at the Session layer of OSI model?

A.

Circuit-level firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Switch-level firewall

Full Access
Question # 21

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Full Access
Question # 22

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Full Access
Question # 23

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

A.

Hacking

B.

Packet filtering

C.

Web caching

D.

Spoofing

Full Access
Question # 24

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Full Access
Question # 25

Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

A.

Blackout

B.

Power spike

C.

Power sag

D.

Power surge

Full Access
Question # 26

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Full Access
Question # 27

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A.

Estimate the potential losses to assets by determining their value.

B.

Establish the threats likelihood and regularity.

C.

Valuations of the critical assets in hard costs.

D.

Evaluate potential threats to the assets.

Full Access
Question # 28

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

A.

IDEA

B.

PGP

C.

DES

D.

AES

Full Access
Question # 29

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Full Access
Question # 30

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.

Ensure that the plan works properly

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that each member of the disaster recovery team is aware of their responsibility.

D.

Ensure that all client computers in the organization are shut down.

Full Access
Question # 31

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?

A.

Certification Practice Statement

B.

Certificate Policy

C.

Certificate Revocation List

D.

Certification Authority

Full Access
Question # 32

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

D.

Data encrypted by the public key can only be decrypted by the secret key.

Full Access
Question # 33

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

A.

Eradication phase

B.

Recovery phase

C.

Containment phase

D.

Preparation phase

E.

Identification phase

Full Access
Question # 34

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

A.

PMK

B.

PTK

C.

PKI

D.

GTK

Full Access
Question # 35

You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?

A.

Stateful packet inspection firewall

B.

Proxy-based firewall

C.

Dynamic packet-filtering firewall

D.

Application gateway firewall

Full Access