Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

ISSAP ISSAP Information Systems Security Architecture Professional Questions and Answers

Questions 4

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

Options:

A.

Asymmetric encryption

B.

Symmetric encryption

C.

S/MIME

D.

PGP

Buy Now
Questions 5

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Options:

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Buy Now
Questions 6

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Buy Now
Questions 7

You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

Options:

A.

Cost-benefit analysis

B.

Gap analysis

C.

Requirement analysis

D.

Vulnerability analysis

Buy Now
Questions 8

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.

Options:

A.

Soda acid

B.

Kerosene

C.

Water

D.

CO2

Buy Now
Questions 9

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

Options:

A.

WEP

B.

IPsec

C.

VPN

D.

SSL

Buy Now
Questions 10

Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.

Options:

A.

Executive summary

Buy Now
Questions 11

Which of the following describes the acceptable amount of data loss measured in time?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Time Objective (RTO)

C.

Recovery Point Objective (RPO)

D.

Recovery Time Actual (RTA)

Buy Now
Questions 12

Which of the following are used to suppress electrical and computer fires? Each correct answer represents a complete solution. Choose two.

Options:

A.

Halon

B.

Water

C.

CO2

D.

Soda acid

Buy Now
Questions 13

Which of the following is a form of gate that allows one person to pass at a time?

Options:

A.

Biometric

B.

Man-trap

C.

Turnstile

D.

Fence

Buy Now
Questions 14

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

Options:

A.

Reduce power consumption

B.

Ease of maintenance

C.

Failover

D.

Load balancing

Buy Now
Questions 15

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Options:

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Buy Now
Questions 16

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

Options:

A.

It represents how many times per year a specific threat occurs.

B.

It represents the percentage of loss that an asset experiences if an anticipated threat occurs.

C.

It is expected loss for an asset due to a risk over a one year period.

D.

It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Buy Now
Questions 17

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

Buy Now
Questions 18

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

Options:

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Checklist test

Buy Now
Questions 19

Which of the following algorithms can be used to check the integrity of a file?

158

Each correct answer represents a complete solution. Choose two.

Options:

A.

md5

B.

rsa

C.

blowfish

D.

sha

Buy Now
Questions 20

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are they most likely using for hashing?

Options:

A.

PKI

B.

SHA

C.

Kerberos

D.

MD5

Buy Now
Questions 21

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

Options:

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

C.

Open Shortest Path First (OSPF)

D.

Extensible Authentication Protocol (EAP)

Buy Now
Questions 22

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

Options:

A.

OFB mode

B.

CFB mode

C.

CBC mode

D.

PCBC mode

Buy Now
Questions 23

You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?

Options:

A.

PGP

B.

SSH

C.

DES

D.

RC4

Buy Now
Questions 24

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

Options:

A.

MD

B.

NTLM

C.

MAC

D.

SHA

Buy Now
Questions 25

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Options:

A.

Single Sign-On

B.

One-time password

C.

Dynamic

D.

Kerberos

Buy Now
Questions 26

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

Options:

A.

Eradication

B.

Identification

C.

Recovery

D.

Containment

Buy Now
Questions 27

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

SPAP

B.

MSCHAP

C.

PAP

D.

MSCHAP V2

Buy Now
Questions 28

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

Options:

A.

Blowfish

B.

Twofish

C.

RSA

D.

Diffie-Hellman

Buy Now
Questions 29

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Buy Now
Questions 30

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Buy Now
Questions 31

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Buy Now
Questions 32

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Disaster recovery planning

B.

SOA value proposition

C.

Software assets reuse

D.

Architectural components abstraction

E.

Business traceability

Buy Now
Questions 33

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Options:

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Buy Now
Questions 34

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Options:

A.

Key card

B.

Biometric devices

C.

Intrusion detection systems

D.

CCTV Cameras

Buy Now
Questions 35

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the fastest method of backing up data.

B.

It is the slowest method for taking a data backup.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Buy Now
Exam Code: ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Nov 21, 2024
Questions: 237
ISSAP pdf

ISSAP PDF

$28  $80
ISSAP Engine

ISSAP Testing Engine

$33.25  $95
ISSAP PDF + Engine

ISSAP PDF + Testing Engine

$45.5  $130