Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

ISSAP Sample Questions Answers

Questions 4

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Buy Now
Questions 5

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

Options:

A.

Power Surge

B.

Power Spike

C.

Blackout

D.

Brownout

Buy Now
Questions 6

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Auditing

B.

Network acchitecture

C.

System access

D.

Data backups

Buy Now
Questions 7

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Mandatory Access Control (MAC)

D.

Access Control List (ACL)

Buy Now
Questions 8

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Buy Now
Questions 9

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Options:

A.

Kerberos

B.

Cryptography

C.

Cryptographer

D.

Cryptanalysis

Buy Now
Questions 10

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Buy Now
Questions 11

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography

Buy Now
Questions 12

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

Options:

A.

Mutual

B.

Anonymous

C.

Multi-factor

D.

Biometrics

Buy Now
Questions 13

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

Options:

A.

Line Conditioner

B.

Surge Suppressor

C.

Uninterrupted Power Supply (UPS)

D.

Expansion Bus

Buy Now
Questions 14

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

Options:

A.

Key card

B.

Biometric devices

C.

Intrusion detection systems

D.

CCTV Cameras

Buy Now
Questions 15

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kerberos requires continuous availability of a central server.

B.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.

C.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

D.

Kerberos requires the clocks of the involved hosts to be synchronized.

Buy Now
Questions 16

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Buy Now
Questions 17

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

Options:

A.

Cipher feedback mode

B.

Cipher block chaining mode

C.

Output feedback mode

D.

Electronic codebook mode

Buy Now
Questions 18

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:

A.

ESP

B.

AH

C.

IKE

D.

ISAKMP

Buy Now
Questions 19

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP

B.

HTTPS

C.

SSL

D.

IPSec

Buy Now
Questions 20

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

Options:

A.

Synchronous

B.

Secret

C.

Asymmetric

D.

Symmetric

Buy Now
Questions 21

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Ticket-granting service

C.

Account service

D.

Authentication service

Buy Now
Questions 22

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using public key infrastructure authentication.

B.

Using basic authentication.

C.

Using Secret keys for authentication.

D.

Using Off-channel verification.

Buy Now
Questions 23

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Options:

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Buy Now
Questions 24

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering

B.

Brute force

C.

Smurf DoS

D.

Ping flood attack

Buy Now
Questions 25

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Options:

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Buy Now
Questions 26

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Buy Now
Questions 27

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Buy Now
Questions 28

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

Options:

A.

IDEA

B.

PGP

C.

DES

D.

AES

Buy Now
Questions 29

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Options:

A.

IPSec

B.

L2TP

C.

LEAP

D.

ISAKMP

Buy Now
Questions 30

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Buy Now
Questions 31

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Buy Now
Questions 32

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

Options:

A.

AES

B.

SHA

C.

EAP

D.

CRC32

Buy Now
Questions 33

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

Options:

A.

Critical path analysis

B.

Functional analysis

C.

Risk analysis

D.

Business impact analysis

Buy Now
Questions 34

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Integrity

B.

Accountability

C.

Availability

D.

Confidentiality

Buy Now
Questions 35

Which of the following statements best describes a certification authority?

Options:

A.

A certification authority is a technique to authenticate digital documents by using computer cryptography.

B.

A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.

C.

A certification authority is an entity that issues digital certificates for use by other parties.

D.

A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.

Buy Now
Questions 36

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Options:

A.

TACACS

B.

S-RPC

C.

RADIUS

D.

CHAP

Buy Now
Questions 37

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Options:

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Buy Now
Questions 38

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

Options:

A.

Authentication

B.

Non-repudiation

C.

Integrity

D.

Confidentiality

Buy Now
Questions 39

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

Options:

A.

GTC

B.

MS-CHAP v2

C.

AES

D.

RC4

Buy Now
Questions 40

What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It provides scalability.

B.

It supports a single backup system.

C.

It increases flexibility and control of access configuration.

D.

It supports RADIUS, TACACS+, and Kerberos authentication methods.

Buy Now
Questions 41

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Guarantee the reliability of standby systems through testing and simulation.

B.

Protect an organization from major computer services failure.

C.

Minimize the risk to the organization from delays in providing services.

D.

Maximize the decision-making required by personnel during a disaster.

Buy Now
Questions 42

Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?

Options:

A.

Thermal alarm systems

B.

Security Guards

C.

Closed circuit cameras

D.

Encryption

Buy Now
Questions 43

Which of the following describes the acceptable amount of data loss measured in time?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Time Objective (RTO)

C.

Recovery Point Objective (RPO)

D.

Recovery Time Actual (RTA)

Buy Now
Questions 44

Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

Options:

A.

Motion detector

Buy Now
Questions 45

The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Construction and selection

B.

Site management

C.

Awareness training

D.

Access control

E.

Intrusion detection

F.

Personnel control

Buy Now
Questions 46

In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?

Options:

A.

Programming and training

B.

Evaluation and acceptance

C.

Definition

D.

Initiation

Buy Now
Questions 47

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

Options:

A.

Disaster recovery plan

B.

Contingency plan

C.

Business Continuity plan

D.

Continuity of Operations plan

Buy Now
Questions 48

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

Options:

A.

Access control

Buy Now
Questions 49

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

Options:

A.

Integrity

B.

Availability

C.

Authenticity

D.

Confidentiality

Buy Now
Questions 50

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

Options:

A.

Port forwarding

B.

NAT

C.

MAC filtering

D.

Firewall

Buy Now
Questions 51

Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.

Options:

A.

Ethernet (IEEE 802.3)

B.

Token ring (IEEE 802.5)

C.

Fiber Distributed Data Interface (FDDI)

D.

Wireless LAN (IEEE 802.11b)

Buy Now
Questions 52

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

Options:

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

Buy Now
Questions 53

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?

Options:

A.

Smart card

B.

USB device with cryptographic data

C.

CHAP

D.

Key fob

Buy Now
Questions 54

You are the Security Consultant and have been contacted by a client regarding their encryption and hashing algorithms. Their in-house network administrator tells you that their current hashing algorithm is an older one with known weaknesses and is not collision resistant.Which algorithm are they most likely using for hashing?

Options:

A.

PKI

B.

SHA

C.

Kerberos

D.

MD5

Buy Now
Questions 55

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall

B.

Endian firewall

C.

Packet filter firewall

D.

Proxy-based firewall

Buy Now
Questions 56

Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Options:

A.

SLE = Asset Value (AV) * Exposure Factor (EF)

B.

SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

C.

SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)

D.

SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

Buy Now
Questions 57

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

Buy Now
Questions 58

You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Layer 3

B.

Layer 2

C.

Layer 4

D.

Layer 1

Buy Now
Questions 59

Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.

Options:

A.

ISDN

B.

X.25

C.

Frame Relay

D.

Leased line

Buy Now
Questions 60

The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?

Options:

A.

Session layer

B.

Presentation layer

C.

Transport layer

D.

Application layer

Buy Now
Questions 61

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

Options:

A.

Repeater

B.

Bridge

C.

Switch

D.

Router

Buy Now
Questions 62

Which of the following authentication methods is based on physical appearance of a user?

Options:

A.

Key fob

B.

Biometrics

C.

ID/password combination

D.

Smart card

Buy Now
Questions 63

The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

Options:

A.

Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.

B.

Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.

C.

Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.

D.

Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.

Buy Now
Questions 64

Which of the following algorithms can be used to check the integrity of a file?

158

Each correct answer represents a complete solution. Choose two.

Options:

A.

md5

B.

rsa

C.

blowfish

D.

sha

Buy Now
Questions 65

Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?

Options:

A.

OFB mode

B.

CFB mode

C.

CBC mode

D.

PCBC mode

Buy Now
Questions 66

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Options:

A.

Implement a sign in sheet at the main entrance and route all traffic through there.

B.

Have all people entering the building use smart cards for access.

C.

Implement biometric access.

D.

Implement cameras at all entrances.

Buy Now
Questions 67

Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?

Options:

A.

PEAP

B.

EAP-TLS

C.

WEP

D.

EAP-FAST

Buy Now
Questions 68

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

Options:

A.

The use of CHAP.

B.

Time of day restrictions.

C.

The use of smart cards.

D.

Video surveillance of all computers.

Buy Now
Questions 69

You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use?

Options:

A.

Hub

B.

Repeater

C.

Bridge

D.

Switch

E.

Router

Buy Now
Questions 70

Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?

Options:

A.

Sherwood Applied Business Security Architecture

B.

Service-oriented modeling and architecture

C.

Enterprise architecture

D.

Service-oriented architecture

Buy Now
Questions 71

Which of the following uses public key cryptography to encrypt the contents of files?

Options:

A.

EFS

B.

DFS

C.

NTFS

D.

RFS

Buy Now
Exam Code: ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: May 1, 2025
Questions: 237
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now ISSAP