Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ISC CISSP-ISSAP Dumps Questions Answers

Page: 1 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 1

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Buy Now
Question 2

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Options:

A.

Key card

B.

Biometric devices

C.

Intrusion detection systems

D.

CCTV Cameras

Question 3

Which of the following is used to authenticate asymmetric keys?

Options:

A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

Question 4

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering

B.

Brute force

C.

Smurf DoS

D.

Ping flood attack

Question 5

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Estimate the potential losses to assets by determining their value.

B.

Establish the threats likelihood and regularity.

C.

Valuations of the critical assets in hard costs.

D.

Evaluate potential threats to the assets.

Question 6

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

Options:

A.

AH

B.

ESP

C.

IPcomp

D.

IKE

Question 7

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Options:

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Question 8

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Options:

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Question 9

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Mandatory Access Control (MAC)

D.

Access Control List (ACL)

Question 10

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Question 11

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

Options:

A.

CHAP

B.

PEAP

C.

EAP

D.

EAP-TLS

Question 12

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

Options:

A.

Eradication

B.

Identification

C.

Recovery

D.

Containment

Question 13

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

Options:

A.

Bus topology

B.

Fully meshed topology

C.

Star topology

D.

Partially meshed topology

Question 14

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

Options:

A.

Halon-f

B.

Halon 1301

C.

Halon 11

D.

Halon 1211

Question 15

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Options:

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Question 16

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

Options:

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

Question 17

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Question 18

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Question 19

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

Options:

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

Question 20

You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

Options:

A.

BitLocker

B.

Smart Cards

C.

Service Accounts

D.

AppLocker

Question 21

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:

A.

Risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Risk mitigation

Question 22

Which of the following decides access control on an object in the mandatory access control (MAC) environment?

Options:

A.

Sensitivity label

B.

Event log

C.

System Access Control List (SACL)

D.

Security log

Question 23

Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.

Options:

A.

A foreign key

B.

A private key

C.

A public key

D.

A primary key

Question 24

Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.

Options:

A.

Strikes

B.

Floods

C.

Accidents

D.

Storms

Question 25

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

Options:

A.

MD

B.

NTLM

C.

MAC

D.

SHA

Question 26

Which of the following algorithms is found to be suitable for both digital signature and encryption?

Options:

A.

SHA-1

B.

MD5

C.

AES

D.

RSA

Question 27

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

Options:

A.

MAC filtering the router

B.

Not broadcasting SSID

C.

Using WEP encryption

D.

Using WPA encryption

Question 28

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:

A.

Water

B.

CO2

C.

Halon

D.

Soda acid

Question 29

Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2

B.

NTLM

C.

EAP-MD5

D.

EAP-TLS

Question 30

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Routing Information Protocol (RIP)

B.

File Transfer Protocol (FTP)

C.

Simple Network Management Protocol (SNMP)

D.

Internet Group Management Protocol (IGMP)

Question 31

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

Options:

A.

Port forwarding

B.

NAT

C.

MAC filtering

D.

Firewall

Question 32

Which of the following authentication methods provides credentials that are only valid during a single session?

Options:

A.

Kerberos v5

B.

Smart card

C.

Certificate

D.

Token

Question 33

Which of the following is a form of gate that allows one person to pass at a time?

Options:

A.

Biometric

B.

Man-trap

C.

Turnstile

D.

Fence

Question 34

You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access. You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read, write, or alter) for his product. Which of the following access control models will you use to accomplish this task?

Options:

A.

Discretionary access control (DAC)

B.

Role-based access control (RBAC)

C.

Mandatory access control (MAC)

D.

Access control list (ACL)

Question 35

An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

Options:

A.

Role-based access control (RBAC)

B.

Network-based access control (NBAC)

C.

Mandatory Access Control (MAC)

D.

Discretionary access control (DAC)

Page: 1 / 9
Total 237 questions