Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 591klB651

Note! The CISSP-ISSAP Exam is no longer available.

CISSP-ISSAP ISSAP Information Systems Security Architecture Professional Questions and Answers

Questions 4

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Buy Now
Questions 5

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It typically executes at a higher speed than a block cipher.

B.

It divides a message into blocks for processing.

C.

It typically executes at a slower speed than a block cipher.

D.

It divides a message into bits for processing.

E.

It is a symmetric key cipher.

Buy Now
Questions 6

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Buy Now
Questions 7

Which of the following is used to authenticate asymmetric keys?

Options:

A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

Buy Now
Questions 8

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Options:

A.

IPSec

B.

L2TP

C.

LEAP

D.

ISAKMP

Buy Now
Questions 9

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

Options:

A.

Social Engineering attack

B.

Brute Force attack

C.

War dialing attack

D.

Replay attack

Buy Now
Questions 10

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Options:

A.

AES

B.

SHA

C.

MD5

D.

DES

Buy Now
Questions 11

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

Buy Now
Questions 12

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP

B.

HTTPS

C.

SSL

D.

IPSec

Buy Now
Questions 13

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

Options:

A.

Bus topology

B.

Fully meshed topology

C.

Star topology

D.

Partially meshed topology

Buy Now
Questions 14

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Buy Now
Questions 15

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options:

A.

IP Security (IPSec)

B.

Microsoft Point-to-Point Encryption (MPPE)

C.

Pretty Good Privacy (PGP)

D.

Data Encryption Standard (DES)

Buy Now
Questions 16

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

TRACERT

B.

PING

C.

IPCONFIG

D.

NSLOOKUP

Buy Now
Questions 17

Which of the following should the administrator ensure during the test of a disaster recovery plan?

Options:

A.

Ensure that the plan works properly

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that each member of the disaster recovery team is aware of their responsibility.

D.

Ensure that all client computers in the organization are shut down.

Buy Now
Questions 18

In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

Options:

A.

Access Control List (ACL)

B.

Mandatory Access Control (MAC)

C.

Role Based Access Control (RBAC)

D.

Discretionary Access Control (DAC)

Buy Now
Questions 19

A company named Money Builders Inc., hires you to provide consultancy for setting up their Windows network. The company's server room will be in a highly secured environment. You are required to suggest an authentication method for it. The CFO of the company wants the server to use thumb impressions for authentication. Which of the following authentication methods will you suggest?

Options:

A.

Certificate

B.

Smart card

C.

Two-factor

D.

Biometrics

Buy Now
Questions 20

You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It relies upon a system of security associations.

B.

It provides key generation mechanisms.

C.

It authenticates communicating peers.

D.

It protects against threats, such as DoS attack, replay attack, etc.

Buy Now
Questions 21

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Options:

A.

PMK

B.

PTK

C.

PKI

D.

GTK

Buy Now
Questions 22

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

Options:

A.

RSA

B.

AES

C.

ECC

D.

DES

Buy Now
Questions 23

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Options:

A.

Stateful firewall

B.

Host-based application firewall

C.

A network-based application layer firewall

D.

An application firewall

Buy Now
Questions 24

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

Options:

A.

Detective access control

B.

Physical access control

C.

Technical access control

D.

Administrative access control

Buy Now
Questions 25

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Buy Now
Questions 26

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Buy Now
Questions 27

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

Buy Now
Questions 28

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for your company's network. The backup policy of the company requires high security and easy recovery of data. Which of the following options will you choose to accomplish this?

Options:

A.

Take a full backup daily and use six-tape rotation.

B.

Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

C.

Take a full backup daily with the previous night's tape taken offsite.

D.

Take a full backup on alternate days and keep rotating the tapes.

E.

Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.

F.

Take a full backup daily with one tape taken offsite weekly.

Buy Now
Questions 29

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:

A.

RCO

B.

RTO

C.

RPO

D.

RTA

Buy Now
Questions 30

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

Options:

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Buy Now
Questions 31

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options:

A.

Structured walk-through test

B.

Simulation test

C.

Full-interruption test

D.

Parallel test

Buy Now
Questions 32

Which of the following heights of fence deters only casual trespassers?

Options:

A.

8 feet

B.

3 to 4 feet

C.

2 to 2.5 feet

D.

6 to 7 feet

Buy Now
Questions 33

Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

Options:

A.

Differential backup

B.

Incremental backup

C.

Daily backup

D.

Full backup

Buy Now
Questions 34

You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?

Options:

A.

PGP

B.

SSH

C.

DES

D.

RC4

Buy Now
Questions 35

Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?

Options:

A.

Disaster recovery plan

B.

Contingency plan

C.

Business continuity plan

D.

Crisis communication plan

Buy Now
Exam Code: CISSP-ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Nov 27, 2023
Questions: 237
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 16 Apr 2024