New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Ace the ISC ISSAP Exam: Ultimate Preparation Guide

Questions 31

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.

Options:
A.

Switch

B.

Router

C.

Bridge

D.

Hub E. Repeater

ISC ISSAP Premium Access
Questions 32

Access control systems enable an authority to control access to areas and resources in a given physical facility or computer-based information system. Which of the following services provided by access control systems is used to determine what a subject can do?

Options:
A.

Authentication

B.

Authorization

C.

Accountability

D.

Identification

Questions 33

Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.

Options:
A.

Block ciphers

B.

Transposition ciphers

C.

Stream ciphers

D.

Substitution ciphers

Questions 34

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

Options:
A.

Risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Risk mitigation

Questions 35

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:
A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

Questions 36

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:
A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Questions 37

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.

Options:
A.

Public key

B.

IPsec

C.

MS-CHAP

D.

Symmetric

Questions 38

Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?

Options:
A.

Blackout

B.

Power spike

C.

Power sag

D.

Power surge

Questions 39

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Public-key cryptography

B.

Kerberos

C.

Preshared keys

D.

Digital certificates

Questions 40

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

Options:
A.

AES

B.

SHA

C.

MD5

D.

DES

Exam Code: ISSAP
Certification Provider: ISC
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Jan 19, 2025
Questions: 237