New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ISC CISSP-ISSAP ISSAP Information Systems Security Architecture Professional Exam Practice Test

Demo: 35 questions
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 1

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Question 2

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

Question 3

Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

Options:

A.

Blackout

B.

Power spike

C.

Power sag

D.

Power surge

Question 4

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:

A.

Buffer-overflow attack

B.

Man-in-the-middle attack

C.

Shoulder surfing attack

D.

Denial-of-Service (DoS) attack

Question 5

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Question 6

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.

Options:

A.

Public key

B.

IPsec

C.

MS-CHAP

D.

Symmetric

Question 7

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Auditing

B.

Network acchitecture

C.

System access

D.

Data backups

Question 8

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options:

A.

Structured walk-through test

B.

Simulation test

C.

Full-interruption test

D.

Parallel test

Question 9

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Options:

Question 10

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

Options:

A.

Hacking

B.

Packet filtering

C.

Web caching

D.

Spoofing

Question 11

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Transport layer

B.

Physical layer

C.

Data Link layer

D.

Network layer

Question 12

Which of the following firewalls inspects the actual contents of packets?

Options:

A.

Packet filtering firewall

B.

Stateful inspection firewall

C.

Application-level firewall

D.

Circuit-level firewall

Question 13

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Options:

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token

Question 14

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

Options:

A.

Star

B.

Mesh

C.

Bus

D.

Ring

Question 15

Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Options:

A.

TACACS

B.

S-RPC

C.

RADIUS

D.

CHAP

Question 16

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

Options:

A.

Power Surge

B.

Power Spike

C.

Blackout

D.

Brownout

Question 17

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

Options:

A.

Line Conditioner

B.

Surge Suppressor

C.

Uninterrupted Power Supply (UPS)

D.

Expansion Bus

Question 18

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:

A.

SPAP

B.

MSCHAP

C.

PAP

D.

MSCHAP V2

Question 19

What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

It provides scalability.

B.

It supports a single backup system.

C.

It increases flexibility and control of access configuration.

D.

It supports RADIUS, TACACS+, and Kerberos authentication methods.

Question 20

Which of the following is the technology of indoor or automotive environmental comfort?

Options:

A.

HIPS

B.

HVAC

C.

NIPS

D.

CCTV

Question 21

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

Options:

A.

MAC filtering the router

B.

Not broadcasting SSID

C.

Using WEP encryption

D.

Using WPA encryption

Question 22

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

Options:

A.

Parallel test

B.

Simulation test

C.

Full-interruption test

D.

Checklist test

Question 23

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

Options:

A.

Executive management interviews

B.

Overlaying system technology

C.

Organizational chart reviews

D.

Organizational process models

Question 24

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Question 25

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?

Options:

A.

Smart card

B.

USB device with cryptographic data

C.

CHAP

D.

Key fob

Question 26

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

Options:

A.

Eradication phase

B.

Recovery phase

C.

Containment phase

D.

Preparation phase

E.

Identification phase

Question 27

Which of the following describes the acceptable amount of data loss measured in time?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Time Objective (RTO)

C.

Recovery Point Objective (RPO)

D.

Recovery Time Actual (RTA)

Question 28

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Options:

A.

PMK

B.

PTK

C.

PKI

D.

GTK

Question 29

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

Options:

A.

UPS

B.

Multimeter

C.

SMPS

D.

CMOS battery

Question 30

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

Options:

A.

Disaster recovery plan

B.

Contingency plan

C.

Business Continuity plan

D.

Continuity of Operations plan

Question 31

Which of the following ports must be opened on the firewall for the VPN connection using Point-to-Point Tunneling Protocol (PPTP)?

Options:

A.

TCP port 110

B.

TCP port 443

C.

TCP port 5060

D.

TCP port 1723

Question 32

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.

Options:

A.

Switch

B.

Router

C.

Bridge

D.

Hub E. Repeater

Question 33

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

Options:

A.

Integrity

B.

Availability

C.

Authenticity

D.

Confidentiality

Question 34

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Options:

A.

Access control entry (ACE)

B.

Discretionary access control entry (DACE)

C.

Access control list (ACL)

D.

Security Identifier (SID)

Question 35

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?

Options:

A.

MAC

B.

Mutual authentication

C.

Three factor authentication

D.

Two factor authentication

Demo: 35 questions
Total 237 questions