Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ISC CISSP-ISSAP ISSAP Information Systems Security Architecture Professional Exam Practice Test

Note! Following CISSP-ISSAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 24
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 1

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

Options:

A.

TCP FIN

B.

Xmas tree

C.

TCP SYN/ACK

D.

TCP SYN

Question 2

Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

Options:

A.

Block cipher

B.

Classical cipher

C.

Substitution cipher

D.

Stream cipher

Question 3

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

Options:

A.

DES

B.

Blowfish

C.

RC5

D.

Diffie-Hellman

Question 4

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

Options:

A.

Twofish

B.

Digital certificates

C.

Public key

D.

RSA

Question 5

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Question 6

Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.

Options:

A.

Ethernet (IEEE 802.3)

B.

Token ring (IEEE 802.5)

C.

Fiber Distributed Data Interface (FDDI)

D.

Wireless LAN (IEEE 802.11b)

Question 7

Which of the following is a form of gate that allows one person to pass at a time?

Options:

A.

Biometric

B.

Man-trap

C.

Turnstile

D.

Fence

Question 8

Fill in the blank with the appropriate encryption system. The ______ encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie- Hellman key agreement.

Options:

A.

ElGamal

Question 9

Which of the following authentication methods provides credentials that are only valid during a single session?

Options:

A.

Kerberos v5

B.

Smart card

C.

Certificate

D.

Token

Question 10

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

Options:

A.

Evacuation drill

B.

Walk-through drill

C.

Structured walk-through test

D.

Full-scale exercise

Question 11

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:

A.

Domain Controller

B.

Certificate User

C.

Certification Authority

D.

Internet Authentication Server

Question 12

Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.

Options:

A.

Strikes

B.

Floods

C.

Accidents

D.

Storms

Question 13

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Executive management interviews

B.

Overlaying system technology

C.

Organizational chart reviews

D.

Organizational process models

Question 14

Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.

Options:

A.

RSA

B.

AES

C.

ECC

D.

DES

Question 15

Which of the following are man-made threats that an organization faces? Each correct answer represents a complete solution. Choose three.

Options:

A.

Theft

B.

Employee errors

C.

Strikes

D.

Frauds

Question 16

Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?

Options:

A.

Skipjack

B.

Blowfish

C.

AES

D.

IDEA

Question 17

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

Options:

A.

Chosen ciphertext attack

B.

Known plaintext attack

C.

Chosen plaintext attack

D.

Ciphertext only attack

Question 18

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

Options:

A.

Connect a brouter to the network.

B.

Implement a proxy server on the network.

C.

Connect a router to the network.

D.

Implement firewall on the network.

Question 19

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

Options:

A.

RBAC

B.

MAC

C.

CIA

D.

DAC

Question 20

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Question 21

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

Options:

A.

ARP

B.

ICMP

C.

TCP

D.

IGMP

Question 22

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the fastest method of backing up data.

B.

It is the slowest method for taking a data backup.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Question 23

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

Options:

A.

Eradication

B.

Identification

C.

Recovery

D.

Containment

Question 24

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

Options:

A.

AH

B.

ESP

C.

IPcomp

D.

IKE

Question 25

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Question 26

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

Options:

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Question 27

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Options:

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Question 28

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

Options:

A.

Cipher feedback mode

B.

Cipher block chaining mode

C.

Output feedback mode

D.

Electronic codebook mode

Question 29

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

Options:

A.

Line Conditioner

B.

Surge Suppressor

C.

Uninterrupted Power Supply (UPS)

D.

Expansion Bus

Question 30

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.

Mutual

B.

Anonymous

C.

Multi-factor

D.

Biometrics

Question 31

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

Options:

A.

Bus topology

B.

Fully meshed topology

C.

Star topology

D.

Partially meshed topology

Question 32

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?

Options:

A.

PS/2

B.

Joystick

C.

Microphone

D.

AGP

Question 33

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

Options:

A.

Halon-f

B.

Halon 1301

C.

Halon 11

D.

Halon 1211

Question 34

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

Options:

A.

TRACERT

B.

PING

C.

IPCONFIG

D.

NSLOOKUP

Question 35

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Page: 1 / 24
Total 237 questions