Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Note! ISC has retired the CISSP-ISSAP Exam Contact us through Live Chat or email us for more information.

CISSP-ISSAP ISSAP Information Systems Security Architecture Professional Questions and Answers

Questions 4

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?

Options:

A.

Full-interruption test

B.

Parallel test

C.

Simulation test

D.

Structured walk-through test

Buy Now
Questions 5

Which of the following uses public key cryptography to encrypt the contents of files?

Options:

A.

EFS

B.

DFS

C.

NTFS

D.

RFS

Buy Now
Questions 6

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:

A.

Water

B.

CO2

C.

Halon

D.

Soda acid

Buy Now
Questions 7

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Buy Now
Questions 8

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering

B.

Brute force

C.

Smurf DoS

D.

Ping flood attack

Buy Now
Questions 9

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Options:

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token

Buy Now
Questions 10

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Options:

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Buy Now
Questions 11

Which of the following should the administrator ensure during the test of a disaster recovery plan?

Options:

A.

Ensure that the plan works properly

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that each member of the disaster recovery team is aware of their responsibility.

D.

Ensure that all client computers in the organization are shut down.

Buy Now
Questions 12

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

Options:

A.

GTC

B.

MS-CHAP v2

C.

AES

D.

RC4

Buy Now
Questions 13

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Options:

Buy Now
Questions 14

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Buy Now
Questions 15

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Disaster recovery planning

B.

SOA value proposition

C.

Software assets reuse

D.

Architectural components abstraction

E.

Business traceability

Buy Now
Questions 16

You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

Options:

A.

Cost-benefit analysis

B.

Gap analysis

C.

Requirement analysis

D.

Vulnerability analysis

Buy Now
Questions 17

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Options:

A.

TACACS

B.

S-RPC

C.

RADIUS

D.

CHAP

Buy Now
Questions 18

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Buy Now
Questions 19

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Options:

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Buy Now
Questions 20

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Public key

B.

IPsec

C.

MS-CHAP

D.

Symmetric

Buy Now
Questions 21

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

TRACERT

B.

PING

C.

IPCONFIG

D.

NSLOOKUP

Buy Now
Questions 22

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:

A.

RCO

B.

RTO

C.

RPO

D.

RTA

Buy Now
Questions 23

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Buy Now
Questions 24

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

Options:

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Buy Now
Questions 25

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

Options:

A.

RSA

B.

AES

C.

ECC

D.

DES

Buy Now
Questions 26

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

Options:

A.

The use of CHAP.

B.

Time of day restrictions.

C.

The use of smart cards.

D.

Video surveillance of all computers.

Buy Now
Questions 27

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

Options:

A.

OFB mode

B.

CFB mode

C.

CBC mode

D.

PCBC mode

Buy Now
Questions 28

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Kerberos

B.

Cryptography

C.

Cryptographer

D.

Cryptanalysis

Buy Now
Questions 29

Which of the following authentication methods provides credentials that are only valid during a single session?

Options:

A.

Kerberos v5

B.

Smart card

C.

Certificate

D.

Token

Buy Now
Questions 30

You are responsible for security at a defense contracting firm. You are evaluating various possible encryption algorithms to use. One of the algorithms you are examining is not integer based, uses shorter keys, and is public key based. What type of algorithm is this?

Options:

A.

Symmetric

B.

None - all encryptions are integer based.

C.

Elliptic Curve

D.

RSA

Buy Now
Questions 31

Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.

Options:

A.

Detection

B.

Continuous Monitoring

C.

Initiation

D.

Auditing

Buy Now
Questions 32

Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?

Options:

A.

PPTP

B.

UDP

C.

IPSec

D.

PAP

Buy Now
Questions 33

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.

Options:

A.

Soda acid

B.

Kerosene

C.

Water

D.

CO2

Buy Now
Questions 34

You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

Options:

A.

Install a network-based IDS

B.

Install a host-based IDS

C.

Install a DMZ firewall

D.

Enable verbose logging on the firewall

Buy Now
Questions 35

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

Options:

A.

Port forwarding

B.

NAT

C.

MAC filtering

D.

Firewall

Buy Now
Exam Code: CISSP-ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Dec 4, 2024
Questions: 237