Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ISC CISSP-ISSAP ISSAP Information Systems Security Architecture Professional Exam Practice Test

Demo: 35 questions
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 1

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Question 2

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Question 3

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

Options:

A.

Ring topology

B.

Tree topology

C.

Star topology

D.

Mesh topology

Question 4

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options:

A.

Structured walk-through test

B.

Simulation test

C.

Full-interruption test

D.

Parallel test

Question 5

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

Options:

A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Question 6

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Options:

Question 7

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

SPAP

B.

MSCHAP

C.

PAP

D.

MSCHAP V2

Question 8

IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two.

Options:

A.

MD5

B.

LEAP

C.

AES

D.

3DES

Question 9

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Question 10

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Options:

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Question 11

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

Options:

A.

Not using laptops.

B.

Keeping all doors locked with a guard.

C.

Using a man-trap.

D.

A sign in log.

Question 12

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

Options:

A.

RBAC

B.

MAC

C.

CIA

D.

DAC

Question 13

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

Options:

A.

Critical path analysis

B.

Functional analysis

C.

Risk analysis

D.

Business impact analysis

Question 14

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Question 15

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP

B.

HTTPS

C.

SSL

D.

IPSec

Question 16

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

Options:

A.

IDEA

B.

PGP

C.

DES

D.

AES

Question 17

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Options:

A.

Key card

B.

Biometric devices

C.

Intrusion detection systems

D.

CCTV Cameras

Question 18

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

Options:

A.

AES

B.

SHA

C.

EAP

D.

CRC32

Question 19

Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Mail bombing

C.

Spoofing

D.

Brute force attack

Question 20

Which of the following is the technology of indoor or automotive environmental comfort?

Options:

A.

HIPS

B.

HVAC

C.

NIPS

D.

CCTV

Question 21

Which of the following algorithms is found to be suitable for both digital signature and encryption?

Options:

A.

SHA-1

B.

MD5

C.

AES

D.

RSA

Question 22

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.company.com. What is the most likely cause?

Options:

A.

The site's Web server is offline.

B.

The site's Web server has heavy traffic.

C.

WINS server has no NetBIOS name entry for the server.

D.

DNS entry is not available for the host name.

Question 23

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Options:

A.

Implement a sign in sheet at the main entrance and route all traffic through there.

B.

Have all people entering the building use smart cards for access.

C.

Implement biometric access.

D.

Implement cameras at all entrances.

Question 24

The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?

Options:

A.

Session layer

B.

Presentation layer

C.

Transport layer

D.

Application layer

Question 25

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

Options:

A.

Connect a brouter to the network.

B.

Implement a proxy server on the network.

C.

Connect a router to the network.

D.

Implement firewall on the network.

Question 26

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are they most likely using for hashing?

Options:

A.

PKI

B.

SHA

C.

Kerberos

D.

MD5

Question 27

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Twofish

B.

Digital certificates

C.

Public key

D.

RSA

Question 28

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

Options:

A.

Port forwarding

B.

NAT

C.

MAC filtering

D.

Firewall

Question 29

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

Options:

A.

PEAP

B.

EAP-TLS

C.

WEP

D.

EAP-FAST

Question 30

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

Options:

A.

DES

B.

Blowfish

C.

RC5

D.

Diffie-Hellman

Question 31

An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

Options:

A.

Role-based access control (RBAC)

B.

Network-based access control (NBAC)

C.

Mandatory Access Control (MAC)

D.

Discretionary access control (DAC)

Question 32

Which of the following are used to suppress electrical and computer fires? Each correct answer represents a complete solution. Choose two.

Options:

A.

Halon

B.

Water

C.

CO2

D.

Soda acid

Question 33

Which of the following ports must be opened on the firewall for the VPN connection using Point-to-Point Tunneling Protocol (PPTP)?

Options:

A.

TCP port 110

B.

TCP port 443

C.

TCP port 5060

D.

TCP port 1723

Question 34

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

Options:

A.

Service-oriented business integration modeling

B.

Service-oriented logical design modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented logical architecture modeling

Question 35

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Authenticity

B.

Globalization

C.

Mobility

D.

Integrity

E.

Confidentiality

F.

Nonrepudiation

Demo: 35 questions
Total 237 questions