New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC ISSAP Practice Exam with Questions & Answers

Questions 1

Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol? Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

TIS authentication

B.

Rhosts (rsh-style) authentication

C.

Kerberos authentication

D.

Password-based authentication

ISC ISSAP Premium Access
Questions 2

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

Options:
A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Questions 3

Which of the following protocols supports encapsulation of encrypted packets in secure wrappers that can be transmitted over a TCP/IP connection?

Options:
A.

PPTP

B.

UDP

C.

IPSec

D.

PAP

Questions 4

Which of the following uses public key cryptography to encrypt the contents of files?

Options:
A.

EFS

B.

DFS

C.

NTFS

D.

RFS

Questions 5

Which of the following statements about Discretionary Access Control List (DACL) is true?

Options:
A.

It specifies whether an audit activity should be performed when an object attempts to access a resource.

B.

It is a unique number that identifies a user, group, and computer account.

C.

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

D.

It is a rule list containing access control entries.

Questions 6

Which of the following SDLC phases consists of the given security controls: Misuse Case Modeling Security Design and Architecture Review Threat and Risk Modeling Security Requirements and Test Cases Generation

Options:
A.

Design

B.

Maintenance

C.

Deployment

D.

Requirements Gathering

Questions 7

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Options:
A.

Safeguard

B.

Annualized Rate of Occurrence (ARO)

C.

Single Loss Expectancy (SLE)

D.

Exposure Factor (EF)

Questions 8

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:
A.

Water

B.

CO2

C.

Halon

D.

Soda acid

Questions 9

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

Options:
A.

Reduce power consumption

B.

Ease of maintenance

C.

Failover

D.

Load balancing

Questions 10

Which of the following encryption algorithms are based on block ciphers?

Options:
A.

RC4

B.

Twofish

C.

Rijndael

D.

RC5

Exam Code: ISSAP
Certification Provider: ISC
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Feb 17, 2025
Questions: 237