Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ISC ISSAP ISSAP Information Systems Security Architecture Professional Exam Practice Test

Demo: 35 questions
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 1

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Risk analysis

B.

Firewall security

C.

Cryptography

D.

OODA loop

Question 2

Which of the following statements best describes a certification authority?

Options:

A.

A certification authority is a technique to authenticate digital documents by using computer cryptography.

B.

A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.

C.

A certification authority is an entity that issues digital certificates for use by other parties.

D.

A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.

Question 3

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Question 4

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Options:

A.

Key card

B.

Biometric devices

C.

Intrusion detection systems

D.

CCTV Cameras

Question 5

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

SPAP

B.

MSCHAP

C.

PAP

D.

MSCHAP V2

Question 6

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Ticket-granting service

C.

Account service

D.

Authentication service

Question 7

Which of the following is used to authenticate asymmetric keys?

Options:

A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

Question 8

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:

A.

ESP

B.

AH

C.

IKE

D.

ISAKMP

Question 9

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

Options:

A.

Star

B.

Mesh

C.

Bus

D.

Ring

Question 10

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP

B.

HTTPS

C.

SSL

D.

IPSec

Question 11

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Integrity

B.

Confidentiality

C.

Authentication

D.

Non-repudiation

Question 12

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

Options:

A.

AES

B.

SHA

C.

EAP

D.

CRC32

Question 13

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Question 14

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

Options:

A.

Bus topology

B.

Fully meshed topology

C.

Star topology

D.

Partially meshed topology

Question 15

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall

B.

Application-level firewall

C.

Packet filtering firewall

D.

Switch-level firewall

Question 16

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

Options:

A.

CHAP

B.

PEAP

C.

EAP

D.

EAP-TLS

Question 17

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

Options:

A.

Critical path analysis

B.

Functional analysis

C.

Risk analysis

D.

Business impact analysis

Question 18

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

Options:

A.

Service-oriented architecture

B.

Sherwood Applied Business Security Architecture

C.

Service-oriented modeling framework

D.

Service-oriented modeling and architecture

Question 19

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Options:

A.

Stateful firewall

B.

Host-based application firewall

C.

A network-based application layer firewall

D.

An application firewall

Question 20

You are responsible for security at a defense contracting firm. You are evaluating various possible encryption algorithms to use. One of the algorithms you are examining is not integer based, uses shorter keys, and is public key based. What type of algorithm is this?

Options:

A.

Symmetric

B.

None - all encryptions are integer based.

C.

Elliptic Curve

D.

RSA

Question 21

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

Options:

A.

Routers

B.

MAC addresses

C.

Firewalls

D.

Hub

Question 22

What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It provides scalability.

B.

It supports a single backup system.

C.

It increases flexibility and control of access configuration.

D.

It supports RADIUS, TACACS+, and Kerberos authentication methods.

Question 23

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?

Options:

A.

IPSec

B.

SET

C.

SWIPE

D.

SKIP

Question 24

Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

Options:

A.

Block cipher

B.

Classical cipher

C.

Substitution cipher

D.

Stream cipher

Question 25

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

Options:

A.

OFB mode

B.

CFB mode

C.

CBC mode

D.

PCBC mode

Question 26

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?

Options:

A.

Service-oriented logical design modeling

B.

Service-oriented conceptual architecture modeling

C.

Service-oriented discovery and analysis modeling

D.

Service-oriented business integration modeling

Question 27

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

Question 28

Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

Options:

A.

Theft

B.

Employee errors

C.

Strikes

D.

Frauds

Question 29

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

Options:

A.

PEAP

B.

EAP-TLS

C.

WEP

D.

EAP-FAST

Question 30

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

Options:

A.

Access control

Question 31

Which of the following algorithms can be used to check the integrity of a file?

158

Each correct answer represents a complete solution. Choose two.

Options:

A.

md5

B.

rsa

C.

blowfish

D.

sha

Question 32

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

Options:

A.

It represents how many times per year a specific threat occurs.

B.

It represents the percentage of loss that an asset experiences if an anticipated threat occurs.

C.

It is expected loss for an asset due to a risk over a one year period.

D.

It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Question 33

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

RADIUS

B.

TACACS+

C.

Media Access control

D.

Peer-to-Peer

Question 34

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

Options:

A.

DES

B.

Blowfish

C.

RC5

D.

Diffie-Hellman

Question 35

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Guarantee the reliability of standby systems through testing and simulation.

B.

Protect an organization from major computer services failure.

C.

Minimize the risk to the organization from delays in providing services.

D.

Maximize the decision-making required by personnel during a disaster.

Demo: 35 questions
Total 237 questions