Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISSAP PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISSAP PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISSAP Information Systems Security Architecture Professional
  • Last Update: Apr 26, 2024
  • Questions and Answers: 237
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISSAP Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISSAP Practice Exam Questions with Answers ISSAP Information Systems Security Architecture Professional Certification

Question # 6

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.

Spoofing

B.

Packet sniffing

C.

Tunneling

D.

Packet filtering

Full Access
Question # 7

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

A.

Integrity

B.

Accountability

C.

Availability

D.

Confidentiality

Full Access
Question # 8

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Full Access
Question # 9

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

A.

Social Engineering attack

B.

Brute Force attack

C.

War dialing attack

D.

Replay attack

Full Access
Question # 10

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

A.

AES

B.

SHA

C.

EAP

D.

CRC32

Full Access
Question # 11

Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?

A.

Cipher

B.

CrypTool

C.

Steganography

D.

MIME

Full Access
Question # 12

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

A.

Disaster recovery planning

B.

SOA value proposition

C.

Software assets reuse

D.

Architectural components abstraction

E.

Business traceability

Full Access
Question # 13

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

A.

Line Conditioner

B.

Surge Suppressor

C.

Uninterrupted Power Supply (UPS)

D.

Expansion Bus

Full Access
Question # 14

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

A.

GTC

B.

MS-CHAP v2

C.

AES

D.

RC4

Full Access
Question # 15

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

A.

Star

B.

Mesh

C.

Bus

D.

Ring

Full Access
Question # 16

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Full Access
Question # 17

Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.

A.

Detection

B.

Continuous Monitoring

C.

Initiation

D.

Auditing

Full Access
Question # 18

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

A.

Construction and selection

B.

Site management

C.

Awareness training

D.

Access control

E.

Intrusion detection

F.

Personnel control

Full Access
Question # 19

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

A.

Cipher feedback mode

B.

Cipher block chaining mode

C.

Output feedback mode

D.

Electronic codebook mode

Full Access
Question # 20

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.

A.

Kerberos requires continuous availability of a central server.

B.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.

C.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

D.

Kerberos requires the clocks of the involved hosts to be synchronized.

Full Access
Question # 21

Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

A.

Blackout

B.

Power spike

C.

Power sag

D.

Power surge

Full Access
Question # 22

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.

A.

TIS authentication

B.

Rhosts (rsh-style) authentication

C.

Kerberos authentication

D.

Password-based authentication

Full Access
Question # 23

Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?

A.

CHAP

B.

PAP

C.

Kerberos

D.

TACACS

Full Access
Question # 24

Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

A.

Theft

B.

Employee errors

C.

Strikes

D.

Frauds

Full Access
Question # 25

Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.

A.

Block ciphers

B.

Transposition ciphers

C.

Stream ciphers

D.

Substitution ciphers

Full Access
Question # 26

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

A.

Service-oriented business integration modeling

B.

Service-oriented logical design modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented logical architecture modeling

Full Access
Question # 27

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?

A.

Certification Practice Statement

B.

Certificate Policy

C.

Certificate Revocation List

D.

Certification Authority

Full Access
Question # 28

In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

A.

Access Control List (ACL)

B.

Mandatory Access Control (MAC)

C.

Role Based Access Control (RBAC)

D.

Discretionary Access Control (DAC)

Full Access
Question # 29

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

Full Access
Question # 30

What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

A.

It provides scalability.

B.

It supports a single backup system.

C.

It increases flexibility and control of access configuration.

D.

It supports RADIUS, TACACS+, and Kerberos authentication methods.

Full Access
Question # 31

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

A.

Detective access control

B.

Corrective access control

C.

Administrative access control

D.

Preventive access control

Full Access
Question # 32

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

D.

Data encrypted by the public key can only be decrypted by the secret key.

Full Access
Question # 33

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

A.

Domain Controller

B.

Certificate User

C.

Certification Authority

D.

Internet Authentication Server

Full Access
Question # 34

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

A.

MD

B.

NTLM

C.

MAC

D.

SHA

Full Access
Question # 35

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

A.

Repeater

B.

Bridge

C.

Switch

D.

Router

Full Access