
Exam Code: CISSP-ISSAP (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Information Systems Security Architecture Professional
Certification Provider: ISC2
Free Today! Guaranteed Training- Pass CISSP-ISSAP Exam.
NEW QUESTION 1
The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.
Answer: CD
NEW QUESTION 2
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Answer: B
NEW QUESTION 3
In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?
Answer: D
NEW QUESTION 4
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
Answer: A
NEW QUESTION 5
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.
Answer: CD
NEW QUESTION 6
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
Answer: A
NEW QUESTION 7
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
Answer: A
NEW QUESTION 8
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?
Answer: A
NEW QUESTION 9
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?
Answer: A
NEW QUESTION 10
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?
Answer: C
NEW QUESTION 11
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Answer: A
NEW QUESTION 12
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
Answer: D
NEW QUESTION 13
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
Answer: ACD
NEW QUESTION 14
Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?
Answer: C
NEW QUESTION 15
You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 16
In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?
Answer: C
NEW QUESTION 17
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?
Answer: C
NEW QUESTION 18
You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?
Answer: B
NEW QUESTION 19
Which of the following types of firewall functions at the Session layer of OSI model?
Answer: A
NEW QUESTION 20
You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the- middle attack. Which of the following methods will you use to accomplish the task?
Answer: C
NEW QUESTION 21
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.
Answer: CD
NEW QUESTION 22
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?
Answer: A
NEW QUESTION 23
A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 24
Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?
Answer: D
NEW QUESTION 25
You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?
Answer: C
NEW QUESTION 26
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
Answer: C
NEW QUESTION 27
John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?
Answer: D
NEW QUESTION 28
You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?
Answer: D
NEW QUESTION 29
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?
Answer: A
NEW QUESTION 30
......
Thanks for reading the newest CISSP-ISSAP exam dumps! We recommend you to try the PREMIUM Certshared CISSP-ISSAP dumps in VCE and PDF here: https://www.certshared.com/exam/CISSP-ISSAP/ (237 Q&As Dumps)