Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISSAP PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISSAP PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISSAP Information Systems Security Architecture Professional
  • Last Update: Jun 17, 2025
  • Questions and Answers: 237
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISSAP Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISSAP Practice Exam Questions with Answers ISSAP Information Systems Security Architecture Professional Certification

Question # 6

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

A.

Executive management interviews

B.

Overlaying system technology

C.

Organizational chart reviews

D.

Organizational process models

Full Access
Question # 7

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

A.

Single Sign-On

B.

One-time password

C.

Dynamic

D.

Kerberos

Full Access
Question # 8

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

A.

Chosen ciphertext attack

B.

Known plaintext attack

C.

Chosen plaintext attack

D.

Ciphertext only attack

Full Access
Question # 9

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

A.

Halon-f

B.

Halon 1301

C.

Halon 11

D.

Halon 1211

Full Access
Question # 10

Which of the following firewalls inspects the actual contents of packets?

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Full Access
Question # 11

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

A.

Service-oriented business integration modeling

B.

Service-oriented logical design modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented logical architecture modeling

Full Access
Question # 12

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

A.

MD

B.

NTLM

C.

MAC

D.

SHA

Full Access
Question # 13

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.

A.

It relies upon a system of security associations.

B.

It provides key generation mechanisms.

C.

It authenticates communicating peers.

D.

It protects against threats, such as DoS attack, replay attack, etc.

Full Access
Question # 14

Which of the following types of attacks cannot be prevented by technical measures only?

A.

Social engineering

B.

Brute force

C.

Smurf DoS

D.

Ping flood attack

Full Access
Question # 15

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Full Access
Question # 16

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Mandatory Access Control (MAC)

D.

Access Control List (ACL)

Full Access
Question # 17

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token

Full Access
Question # 18

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

A.

Integrity

B.

Availability

C.

Authenticity

D.

Confidentiality

Full Access
Question # 19

In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?

A.

Programming and training

B.

Evaluation and acceptance

C.

Definition

D.

Initiation

Full Access
Question # 20

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

A.

Risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Risk mitigation

Full Access
Question # 21

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

A.

RADIUS

B.

TACACS+

C.

Media Access control

D.

Peer-to-Peer

Full Access
Question # 22

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

A.

OFB mode

B.

CFB mode

C.

CBC mode

D.

PCBC mode

Full Access
Question # 23

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

A.

PMK

B.

PTK

C.

PKI

D.

GTK

Full Access
Question # 24

Which of the following encryption algorithms are based on block ciphers?

A.

RC4

B.

Twofish

C.

Rijndael

D.

RC5

Full Access
Question # 25

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

A.

Full-interruption test

B.

Parallel test

C.

Simulation test

D.

Structured walk-through test

Full Access
Question # 26

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

A.

UPS

B.

Multimeter

C.

SMPS

D.

CMOS battery

Full Access
Question # 27

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

Full Access
Question # 28

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

A.

Routers

B.

MAC addresses

C.

Firewalls

D.

Hub

Full Access
Question # 29

You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization's disaster recovery efforts?

A.

Technical guide

B.

Executive summary

C.

Checklist

D.

Department-specific plan

Full Access
Question # 30

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

A.

Pairwise Transient Key

B.

Group Temporal Key

C.

Private Key

D.

Pairwise Master Key

Full Access
Question # 31

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? Each correct answer represents a complete solution. Choose two.

A.

DNS cache poisoning

B.

MAC spoofing

C.

IP spoofing attack

D.

DDoS attack

Full Access
Question # 32

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

A.

Install a network-based IDS

B.

Install a host-based IDS

C.

Install a DMZ firewall

D.

Enable verbose logging on the firewall

Full Access
Question # 33

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.

Stateful firewall

B.

Endian firewall

C.

Packet filter firewall

D.

Proxy-based firewall

Full Access
Question # 34

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

A.

Construction and selection

B.

Site management

C.

Awareness training

D.

Access control

E.

Intrusion detection

F.

Personnel control

Full Access
Question # 35

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

D.

Data encrypted by the public key can only be decrypted by the secret key.

Full Access
Question # 36

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

A.

Take a full backup daily and use six-tape rotation.

B.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

C.

Take a full backup daily with the previous night's tape taken offsite.

D.

Take a full backup on alternate days and keep rotating the tapes.

E.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

F.

Take a full backup daily with one tape taken offsite weekly.

Full Access
Question # 37

An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

A.

Role-based access control (RBAC)

B.

Network-based access control (NBAC)

C.

Mandatory Access Control (MAC)

D.

Discretionary access control (DAC)

Full Access
Question # 38

You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall. Which of the following firewalls has this feature?

A.

Stateful packet inspection firewall

B.

Proxy-based firewall

C.

Dynamic packet-filtering firewall

D.

Application gateway firewall

Full Access
Question # 39

Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Mail bombing

C.

Spoofing

D.

Brute force attack

Full Access
Question # 40

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.

A.

Switch

B.

Router

C.

Bridge

D.

Hub E. Repeater

Full Access
Question # 41

Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

A.

Differential backup

B.

Incremental backup

C.

Daily backup

D.

Full backup

Full Access
Question # 42

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are they most likely using for hashing?

A.

PKI

B.

SHA

C.

Kerberos

D.

MD5

Full Access
Question # 43

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

A.

PPTP

B.

SMTP

C.

HTTPS

D.

L2TP

Full Access
Question # 44

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Full Access
Question # 45

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Full Access
Question # 46

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

Firewall security

C.

Cryptography

D.

OODA loop

Full Access
Question # 47

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Full Access
Question # 48

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

A.

Cipher feedback mode

B.

Cipher block chaining mode

C.

Output feedback mode

D.

Electronic codebook mode

Full Access
Question # 49

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

A.

Smart card access to all areas with computers.

B.

Use laptop locks.

C.

Video surveillance on all areas with computers.

D.

Appoint a security guard.

Full Access
Question # 50

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

A.

Service-oriented architecture

B.

Sherwood Applied Business Security Architecture

C.

Service-oriented modeling framework

D.

Service-oriented modeling and architecture

Full Access
Question # 51

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

A.

Buffer-overflow attack

B.

Man-in-the-middle attack

C.

Shoulder surfing attack

D.

Denial-of-Service (DoS) attack

Full Access
Question # 52

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Full Access
Question # 53

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

A.

GTC

B.

MS-CHAP v2

C.

AES

D.

RC4

Full Access
Question # 54

Which of the following attacks can be overcome by applying cryptography?

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

Full Access
Question # 55

Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?

A.

Cipher

B.

CrypTool

C.

Steganography

D.

MIME

Full Access
Question # 56

You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

A.

Cost-benefit analysis

B.

Gap analysis

C.

Requirement analysis

D.

Vulnerability analysis

Full Access
Question # 57

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

A.

AES

B.

SHA

C.

MD5

D.

DES

Full Access
Question # 58

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Integrity

B.

Confidentiality

C.

Authentication

D.

Non-repudiation

Full Access
Question # 59

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

A.

TRACERT

B.

PING

C.

IPCONFIG

D.

NSLOOKUP

Full Access
Question # 60

You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?

A.

Hub

B.

Switch

C.

Repeater

D.

Router

Full Access
Question # 61

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Full Access
Question # 62

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

A.

Mutual

B.

Anonymous

C.

Multi-factor

D.

Biometrics

Full Access
Question # 63

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

A.

SPAP

B.

MSCHAP

C.

PAP

D.

MSCHAP V2

Full Access
Question # 64

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

A.

It typically executes at a higher speed than a block cipher.

B.

It divides a message into blocks for processing.

C.

It typically executes at a slower speed than a block cipher.

D.

It divides a message into bits for processing.

E.

It is a symmetric key cipher.

Full Access
Question # 65

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Full Access
Question # 66

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

A.

Auditing

B.

Network acchitecture

C.

System access

D.

Data backups

Full Access
Question # 67

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.

A.

Public key

B.

IPsec

C.

MS-CHAP

D.

Symmetric

Full Access
Question # 68

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Full Access
Question # 69

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

A.

Social Engineering attack

B.

Brute Force attack

C.

War dialing attack

D.

Replay attack

Full Access
Question # 70

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

A.

RCO

B.

RTO

C.

RPO

D.

RTA

Full Access
Question # 71

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

A.

IPSec

B.

L2TP

C.

LEAP

D.

ISAKMP

Full Access