Certbus > ISC > ISC Certification > ISSAP > ISSAP Online Practice Questions and Answers

ISSAP Online Practice Questions and Answers

Questions 4

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A. Integrity

B. Confidentiality

C. Authentication

D. Non-repudiation

Browse 237 Q&As
Questions 5

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

A. Smart card access to all areas with computers.

B. Use laptop locks.

C. Video surveillance on all areas with computers.

D. Appoint a security guard.

Browse 237 Q&As
Questions 6

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

A. Public-key cryptography

B. Kerberos

C. Preshared keys

D. Digital certificates

Browse 237 Q&As
Questions 7

Which of the following is the technology of indoor or automotive environmental comfort?

A. HIPS

B. HVAC

C. NIPS

D. CCTV

Browse 237 Q&As
Questions 8

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?

A. IPSec

B. SET

C. SWIPE

D. SKIP

Browse 237 Q&As
Questions 9

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

A. It represents how many times per year a specific threat occurs.

B. It represents the percentage of loss that an asset experiences if an anticipated threat occurs.

C. It is expected loss for an asset due to a risk over a one year period.

D. It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Browse 237 Q&As
Questions 10

What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

A. It provides scalability.

B. It supports a single backup system.

C. It increases flexibility and control of access configuration.

D. It supports RADIUS, TACACS+, and Kerberos authentication methods.

Browse 237 Q&As
Questions 11

Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.

A. Strikes

B. Floods

C. Accidents

D. Storms

Browse 237 Q&As
Questions 12

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

A. Initiation

B. Programming and training

C. Design

D. Evaluation and acceptance

Browse 237 Q&As
Questions 13

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

A. Eradication phase

B. Recovery phase

C. Containment phase

D. Preparation phase

E. Identification phase

Browse 237 Q&As
Questions 14

Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?

A. PPTP

B. UDP

C. IPSec

D. PAP

Browse 237 Q&As
Questions 15

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

A. PMK

B. PTK

C. PKI

D. GTK

Browse 237 Q&As
Questions 16

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

A. Block cipher

B. Stream cipher

C. Transposition cipher

D. Message Authentication Code

Browse 237 Q&As
Questions 17

Which of the following is the most secure method of authentication?

A. Smart card

B. Anonymous

C. Username and password

D. Biometrics

Browse 237 Q&As
Questions 18

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

A. Construction and selection

B. Site management

C. Awareness training

D. Access control

E. Intrusion detection

F. Personnel control

Browse 237 Q&As
Exam Code: ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Apr 14, 2024
Questions: 237 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99