New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Newly Released ISC ISSAP Exam PDF

Page: 4 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 13

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Question 14

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

Options:

A.

Chosen ciphertext attack

B.

Known plaintext attack

C.

Chosen plaintext attack

D.

Ciphertext only attack

Question 15

Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

Options:

A.

Service-oriented modeling framework (SOMF)

B.

Service-oriented modeling and architecture (SOMA)

C.

Sherwood Applied Business Security Architecture (SABSA)

D.

Service-oriented architecture (SOA)

Question 16

Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?

Options:

A.

Mark as final

B.

Digital Signature

C.

Restrict Permission

D.

Encrypt Document

Page: 4 / 9
Total 237 questions