Leads4pass > ISC > ISC Certifications > ISSAP > ISSAP Online Practice Questions and Answers

ISSAP Online Practice Questions and Answers

Questions 4

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

A. CHAP

B. PEAP

C. EAP

D. EAP-TLS

Buy Now
Questions 5

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A. Estimate the potential losses to assets by determining their value.

B. Establish the threats likelihood and regularity.

C. Valuations of the critical assets in hard costs.

D. Evaluate potential threats to the assets.

Buy Now
Questions 6

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A. Ensure that the plan works properly

B. Ensure that all the servers in the organization are shut down.

C. Ensure that each member of the disaster recovery team is aware of their responsibility.

D. Ensure that all client computers in the organization are shut down.

Buy Now
Questions 7

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

A. Pairwise Transient Key

B. Group Temporal Key

C. Private Key

D. Pairwise Master Key

Buy Now
Questions 8

You are implementing some security services in an organization, such as smart cards, biometrics, access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the following categories of implementation of the access control includes all these security services?

A. Administrative access control

B. Logical access control

C. Physical access control

D. Preventive access control

Buy Now
Questions 9

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is

not enough and want to have employees use tokens for authentication.

Which of the following is not an example of tokens?

A. Smart card

B. USB device with cryptographic data

C. CHAP

D. Key fob

Buy Now
Questions 10

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

A. Routers

B. MAC addresses

C. Firewalls

D. Hub

Buy Now
Questions 11

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

A. OFB mode

B. CFB mode

C. CBC mode

D. PCBC mode

Buy Now
Questions 12

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

A. Block cipher

B. Stream cipher

C. Transposition cipher

D. Message Authentication Code

Buy Now
Questions 13

Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?

A. Sherwood Applied Business Security Architecture

B. Service-oriented modeling and architecture

C. Enterprise architecture

D. Service-oriented architecture

Buy Now
Exam Code: ISSAP
Exam Name: ISSAP - Information Systems Security Architecture Professional (ISSAP)
Last Update:
Questions: 237
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99