New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC certification ISSAP ISC Study Notes

Page: 2 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 5

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

Options:

A.

Initiation

B.

Programming and training

C.

Design

D.

Evaluation and acceptance

Question 6

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.

B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.

C.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

D.

Data encrypted by the public key can only be decrypted by the secret key.

Question 7

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Question 8

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Identification

B.

Eradication

C.

Recovery

D.

Contamination

E.

Preparation

Page: 2 / 9
Total 237 questions