New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

ISSAP ISSAP Information Systems Security Architecture Professional Questions and Answers

Questions 4

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Buy Now
Questions 5

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Public-key cryptography

B.

Kerberos

C.

Preshared keys

D.

Digital certificates

Buy Now
Questions 6

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Options:

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Buy Now
Questions 7

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Options:

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token

Buy Now
Questions 8

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

Options:

A.

Policy Access Control

B.

Mandatory Access Control

C.

Discretionary Access Control

D.

Role-Based Access Control

Buy Now
Questions 9

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Mandatory Access Control (MAC)

D.

Access Control List (ACL)

Buy Now
Questions 10

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:

A.

ESP

B.

AH

C.

IKE

D.

ISAKMP

Buy Now
Questions 11

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:

A.

Buffer-overflow attack

B.

Man-in-the-middle attack

C.

Shoulder surfing attack

D.

Denial-of-Service (DoS) attack

Buy Now
Questions 12

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.

Mutual

B.

Anonymous

C.

Multi-factor

D.

Biometrics

Buy Now
Questions 13

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Buy Now
Questions 14

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Buy Now
Questions 15

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Buy Now
Questions 16

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using public key infrastructure authentication.

B.

Using basic authentication.

C.

Using Secret keys for authentication.

D.

Using Off-channel verification.

Buy Now
Questions 17

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the fastest method of backing up data.

B.

It is the slowest method for taking a data backup.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Buy Now
Questions 18

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It typically executes at a higher speed than a block cipher.

B.

It divides a message into blocks for processing.

C.

It typically executes at a slower speed than a block cipher.

D.

It divides a message into bits for processing.

E.

It is a symmetric key cipher.

Buy Now
Questions 19

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Identification

B.

Eradication

C.

Recovery

D.

Contamination

E.

Preparation

Buy Now
Questions 20

Which of the following is a form of gate that allows one person to pass at a time?

Options:

A.

Biometric

B.

Man-trap

C.

Turnstile

D.

Fence

Buy Now
Questions 21

Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?

Options:

A.

Pre-shared key authentication

B.

Open system authentication

C.

Shared key authentication

D.

Single key authentication

Buy Now
Questions 22

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

Options:

A.

RSA

B.

AES

C.

ECC

D.

DES

Buy Now
Questions 23

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It relies upon a system of security associations.

B.

It provides key generation mechanisms.

C.

It authenticates communicating peers.

D.

It protects against threats, such as DoS attack, replay attack, etc.

Buy Now
Questions 24

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:

A.

Domain Controller

B.

Certificate User

C.

Certification Authority

D.

Internet Authentication Server

Buy Now
Questions 25

Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

Options:

A.

IPSec

B.

PPPoE

C.

PPP

D.

TFTP

Buy Now
Questions 26

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

Options:

A.

Evacuation drill

B.

Walk-through drill

C.

Structured walk-through test

D.

Full-scale exercise

Buy Now
Questions 27

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

Options:

A.

Detective access control

B.

Physical access control

C.

Technical access control

D.

Administrative access control

Buy Now
Questions 28

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

Options:

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

Buy Now
Questions 29

You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?

Options:

A.

PGP

B.

SSH

C.

DES

D.

RC4

Buy Now
Questions 30

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Buy Now
Questions 31

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Twofish

B.

Digital certificates

C.

Public key

D.

RSA

Buy Now
Questions 32

In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

Options:

A.

Access Control List (ACL)

B.

Mandatory Access Control (MAC)

C.

Role Based Access Control (RBAC)

D.

Discretionary Access Control (DAC)

Buy Now
Questions 33

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

Options:

A.

PEAP

B.

EAP-TLS

C.

WEP

D.

EAP-FAST

Buy Now
Questions 34

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric

B.

Symmetric

C.

S/MIME

D.

PGP

Buy Now
Questions 35

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

Buy Now
Exam Code: ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Dec 22, 2024
Questions: 237

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99