CISSP – ISSAP Information Systems Security Architecture Professional Sample Questions

  1. Home
  2. CISSP – ISSAP Information Systems Security Architecture Professional Sample Questions
CISSP - ISSAP Information Systems Security Architecture Professional sample questions

CISSP – ISSAP Information Systems Security Architecture Professional Certification Exam is for professional candidates gaining practical experience in designing security solutions and furnishing the board with risk-based direction to meet hierarchical objectives. CISSP – ISSAP Information Systems Security Architecture Professional Certification Exam work with the alignment of security solutions inside the organizational setting like vision, mission, strategy, policies, necessities, change, and external factors. The broad range of points included in the ISSAP Common Body of Knowledge (CBK) guarantees its pertinence across all disciplines in the field of information security.

1.) Which of the accompanying components of the planning gap estimates the gap between the complete potential for the market and the real current use by every one of the buyers on the lookout?

A. Project gap
B. Competitive gap
C. Product gap
D. Usage gap

Right Answer: D

2.) Which of the accompanying terms alludes to the technique that permits or limits explicit sorts of parcels from getting over the firewall?

A. Hacking
B. Spoofing
C. Web caching
D. Packet filtering

Right Answer: D

3.) You fill in as a Network Administrator for NetTech Inc. The organization needs to encrypt the emails. Which of the accompanying will you use to achieve this?

A. PGP
B. PPTP
C. IPSec
D. NTFS

Right Answer: A

4.) Samuel functions as a Network Administrator for Net World Inc. The organization needs to permit distant clients to interface and access its confidential organization through a dial-up association by means of the Internet. Every one of the information will be sent across a public organization. For the sake of security, the administration needs the information sent through the Internet to be encoded. The organization intends to utilize a Layer 2 Tunneling Protocol (L2TP) association. Which correspondence convention will Peter use to achieve the assignment?

A. IP Security (IPSec)
B. Microsoft Point-to-Point Encryption (MPPE)
C. Very Good Privacy (PGP)
D. Information Encryption Standard (DES)

Right Answer: A

5.) Which of the accompanying conventions multicasts messages and data among all part gadgets in an IP multicast bunch?

A. ARP
B. ICMP
C. TCP
D. IGMP

Right Answer: D

6.) Which of the accompanying security gadgets is introduced to demonstrate some accomplishment of administration, an exceptional achievement, an image of power conceded by making a vow, an indication of genuine work or understudy status, or as a basic method for ID?

A. Sensor
B. Motion detector
C. Alarm
D. Identification

Right Answer: D

7.) Which of coming up next is a technique for changing a message into a covered structure, along with an approach to fixing the change to recuperate the message?

A. MIME
B. CrypTool
C. Steganography
D. Cipher

Right Answer: D

8.) Max fills in as a Network Administrator for NetTech Inc. He believes clients should get to just those assets that are expected for them. Which of the accompanying access control models will he use?

A. Mandatory Access Control
B. Policy Access Control
C. Role-Based Access Control
D. Discretionary Access Control

Right Answer: D

9.) Which of coming up next is utilized to verify hilter kilter keys?

A. A digital signature
B. Mac Address
C. Password
D. Demilitarized zone (DMZ)

Right Answer: A

10.) IPsec VPN gives a serious level of information security by laying out trust focuses between conveying gadgets and information encryption. Which of the accompanying encryption techniques does IPsec VPN utilize? Each right response addresses a total arrangement. Pick two.

A. MD5
B. LEAP
C. AES
D. 3DES

Right Answer: DC

11.) A client is sending an enormous number of protocol packets to an organization to soak its assets and upset associations with forestall correspondences between administrations. Which sort of assault is this?

A. Vulnerability attack
B. Denial-of-Service attack
C. Social Engineering attack
D. Impersonation attack

Right Answer: A

12.) Which of the accompanying sorts of firewall capabilities at the Session layer of the OSI model?

A. circuit-level firewall
B. Application-level firewall
C. Bundle sifting firewall
D. Switch-level firewall

Right Answer: A

13.) Which of the accompanying assertions about a stream figure are valid? Each right response addresses a total arrangement. Pick three.

A. It regularly executes at a higher speed than a block figure.
B. It separates a message into blocks for handling.
C. It regularly executes at a more slow speed than a block figure.
D. It partitions a message into bits for handling.
E. It is a symmetric key code.

Right Answer: ADE

14.) Which of the accompanying sorts of assault can be utilized to break the best physical and coherent security component to get to a framework?

A. Social designing assault
B. Cross site prearranging assault
C. Mail besieging
D. Secret key speculating assault

Right Answer: A

15.) You are the Security Consultant prompting an organization on security strategies. This is an exceptionally solid area that arrangements with delicate public protection related information.
They are exceptionally worried about actual security as they had a break the month before. In that break an individual had just gotten a PC and ran out of the structure. Which one of the accompanying could have been best in forestalling this?

A. Not utilizing laptops.
B. A sign in log.
C. Utilizing a man-trap.
D. Keeping all doors locked with a guard.

Right Answer: C

16.) You need to execute an organization geography that gives the best equilibrium to territorial geographies with regards to the quantity of virtual circuits, overt repetitiveness, and execution while laying out a WAN organization. Which of the accompanying organization geographies will you use to achieve the errand?

A. Star topology
B. Bus topology
C. Partially meshed topology
D. Fully meshed topology

Right Answer: C

17.) Which of the accompanying conventions is a choice to declaration disavowal records (CRL) and permits the genuineness of a testament to be quickly checked?

A. RSTP
B. SKIP
C. OCSP
D. HTTP

Right Answer: C

18.) Which of the accompanying does PEAP use to verify the client inside a scrambled passage? Each right response addresses a total arrangement. Pick two.

A. GTC
B. MS-CHAP v2
C. AES
D. RC4

Right Answer: BA

19.) Which of the accompanying terms alludes to a system which demonstrates that the shipper truly sent a specific message?

A. Non-repudiation
B. Authentication
C. Confidentiality
D. Integrity

Right Answer: A

20.) Adam functions as a Security Analyst for Umbrella Inc. Chief of the organization requested him to carry out two-factor validation for the representatives to get to their organizations. He has let him know that he might want to involve some sort of equipment gadget pair with security or recognizing pin number. Adam chooses to carry out savvy cards yet they are not practical. Which of the accompanying kinds of equipment gadgets will Adam use to carry out two-factor confirmation?

A. Biometric device
B. One-Time Password
C. Proximity cards
D. Security token

Right Answer: D

CISSP - ISSAP Information Systems Security Architecture Professional practice test
Menu