getcertified4sure.com

CISSP-ISSAP Exam

Updated CISSP-ISSAP Prep 2021




Cause all that matters here is passing the ISC2 CISSP-ISSAP exam. Cause all that you need is a high score of CISSP-ISSAP Information Systems Security Architecture Professional exam. The only one thing you need to do is downloading Actualtests CISSP-ISSAP exam study guides now. We will not let you down with our money-back guarantee.

NEW QUESTION 1
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

  • A. Integrity
  • B. Confidentiality
  • C. Authentication
  • D. Non-repudiation

Answer: D

NEW QUESTION 2
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

  • A. Pairwise Transient Key
  • B. Group Temporal Key
  • C. Private Key
  • D. Pairwise Master Key

Answer: D

NEW QUESTION 3
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

  • A. Man trap
  • B. Biometric device
  • C. Host Intrusion Detection System (HIDS)
  • D. Network Intrusion Detection System (NIDS)

Answer: A

NEW QUESTION 4
Which of the following is used to authenticate asymmetric keys?

  • A. Digital signature
  • B. MAC Address
  • C. Demilitarized zone (DMZ)
  • D. Password

Answer: A

NEW QUESTION 5
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?

  • A. Gap analysis
  • B. Requirement analysis
  • C. Cost-benefit analysis
  • D. Vulnerability analysis

Answer: A

NEW QUESTION 6
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

  • A. The transport layer
  • B. The presentation layer
  • C. The session layer
  • D. The application layer

Answer: A

NEW QUESTION 7
You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

  • A. Implement a sign in sheet at the main entrance and route all traffic through ther
  • B. Have all people entering the building use smart cards for acces
  • C. Implement biometric acces
  • D. Implement cameras at all entrance

Answer: A

NEW QUESTION 8
Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

  • A. DES
  • B. Blowfish
  • C. RC5
  • D. Diffie-Hellman

Answer: ABC

NEW QUESTION 9
Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

  • A. Single Sign-On
  • B. One-time password
  • C. Dynamic
  • D. Kerberos

Answer: A

NEW QUESTION 10
Fill in the blank with the appropriate security device. ____ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

  • A. Motion detector

Answer: A

NEW QUESTION 11
Which of the following schemes is used by the Kerberos authentication?

  • A. Public key cryptography
  • B. One time password
  • C. Private key cryptography
  • D. OPIE

Answer: C

NEW QUESTION 12
Which of the following processes identifies the threats that can impact the business continuity of operations?

  • A. Function analysis
  • B. Risk analysis
  • C. Business impact analysis
  • D. Requirement analysis

Answer: C

NEW QUESTION 13
You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

  • A. BitLocker
  • B. Smart Cards
  • C. Service Accounts
  • D. AppLocker

Answer: B

NEW QUESTION 14
You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization's disaster recovery efforts?

  • A. Technical guide
  • B. Executive summary
  • C. Checklist
  • D. Department-specific plan

Answer: B

NEW QUESTION 15
Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms?

  • A. Sherwood Applied Business Security Architecture
  • B. Service-oriented modeling and architecture
  • C. Enterprise architecture
  • D. Service-oriented architecture

Answer: D

NEW QUESTION 16
A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

  • A. A break in a network cable
  • B. 75 ohm terminators at open ends
  • C. A powered off workstation
  • D. An open-ended cable without terminators

Answer: ABD

NEW QUESTION 17
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

  • A. PPTP
  • B. SMTP
  • C. HTTPS
  • D. L2TP

Answer: D

NEW QUESTION 18
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  • A. Risk analysis
  • B. Firewall security
  • C. Cryptography
  • D. OODA loop

Answer: C

NEW QUESTION 19
Which of the following describes the acceptable amount of data loss measured in time?

  • A. Recovery Consistency Objective (RCO)
  • B. Recovery Time Objective (RTO)
  • C. Recovery Point Objective (RPO)
  • D. Recovery Time Actual (RTA)

Answer: C

NEW QUESTION 20
Which of the following protocols work at the Network layer of the OSI model?

  • A. Routing Information Protocol (RIP)
  • B. File Transfer Protocol (FTP)
  • C. Simple Network Management Protocol (SNMP)
  • D. Internet Group Management Protocol (IGMP)

Answer: AD

NEW QUESTION 21
You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

  • A. Cost-benefit analysis
  • B. Gap analysis
  • C. Requirement analysis
  • D. Vulnerability analysis

Answer: B

NEW QUESTION 22
Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.

  • A. Block ciphers
  • B. Transposition ciphers
  • C. Stream ciphers
  • D. Substitution ciphers

Answer: BD

NEW QUESTION 23
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

  • A. ARP
  • B. ICMP
  • C. TCP
  • D. IGMP

Answer: D

NEW QUESTION 24
Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

  • A. Firewall
  • B. NAT
  • C. MAC address
  • D. IPSec

Answer: D

NEW QUESTION 25
You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

  • A. Smart cards
  • B. Key fobs
  • C. VPN
  • D. Biometrics

Answer: B

NEW QUESTION 26
......

P.S. Easily pass CISSP-ISSAP Exam with 237 Q&As Simply pass Dumps & pdf Version, Welcome to Download the Newest Simply pass CISSP-ISSAP Dumps: https://www.simply-pass.com/ISC2-exam/CISSP-ISSAP-dumps.html (237 New Questions)