New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC ISSAP Practice Exam with Questions & Answers | Set: 5

Questions 41

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Options:
A.

IPSec

B.

L2TP

C.

LEAP

D.

ISAKMP

ISC ISSAP Premium Access
Questions 42

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following protocols should he disable to ensure that the password is encrypted during remote access?

Options:
A.

SPAP

B.

MSCHAP

C.

PAP

D.

MSCHAP V2

Questions 43

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

Options:
A.

Critical path analysis

B.

Functional analysis

C.

Risk analysis

D.

Business impact analysis

Questions 44

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

Options:
A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Questions 45

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?

Options:
A.

PS/2

B.

Joystick

C.

Microphone

D.

AGP

Questions 46

Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?

Options:
A.

ESP

B.

AH

C.

IKE

D.

ISAKMP

Questions 47

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

Options:
A.

Star

B.

Mesh

C.

Bus

D.

Ring

Questions 48

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Integrity

B.

Accountability

C.

Availability

D.

Confidentiality

Questions 49

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

Options:
A.

Auditing

B.

Network acchitecture

C.

System access

D.

Data backups

Questions 50

Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?

Options:
A.

Cipher

B.

CrypTool

C.

Steganography

D.

MIME

Exam Code: ISSAP
Certification Provider: ISC
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Feb 6, 2025
Questions: 237