New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC ISSAP Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Authenticity

B.

Globalization

C.

Mobility

D.

Integrity

E.

Confidentiality

F.

Nonrepudiation

ISC ISSAP Premium Access
Questions 12

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:
A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Questions 13

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

Options:
A.

Firewall

B.

NAT

C.

MAC address

D.

IPSec

Questions 14

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Options:
A.

Implement a sign in sheet at the main entrance and route all traffic through there.

B.

Have all people entering the building use smart cards for access.

C.

Implement biometric access.

D.

Implement cameras at all entrances.

Questions 15

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

Options:
A.

The use of CHAP.

B.

Time of day restrictions.

C.

The use of smart cards.

D.

Video surveillance of all computers.

Questions 16

Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?

Options:
A.

CHAP

B.

PAP

C.

Kerberos

D.

TACACS

Questions 17

Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?

Options:
A.

Skipjack

B.

Blowfish

C.

AES

D.

IDEA

Questions 18

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:
A.

Domain Controller

B.

Certificate User

C.

Certification Authority

D.

Internet Authentication Server

Questions 19

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Options:
A.

PMK

B.

PTK

C.

PKI

D.

GTK

Questions 20

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

Options:
A.

PPTP

B.

SMTP

C.

HTTPS

D.

L2TP

Exam Code: ISSAP
Certification Provider: ISC
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Feb 17, 2025
Questions: 237