Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ISC ISSAP Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following types of attacks cannot be prevented by technical measures only?

Options:
A.

Social engineering

B.

Brute force

C.

Smurf DoS

D.

Ping flood attack

ISC ISSAP Premium Access
Questions 52

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

Options:
A.

Service-oriented architecture

B.

Sherwood Applied Business Security Architecture

C.

Service-oriented modeling framework

D.

Service-oriented modeling and architecture

Questions 53

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:
A.

Denial-of-Service attack

B.

Vulnerability attack

C.

Social Engineering attack

D.

Impersonation attack

Questions 54

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:
A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Questions 55

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Transport layer

B.

Physical layer

C.

Data Link layer

D.

Network layer

Questions 56

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?

Options:
A.

Project gap

B.

Product gap

C.

Competitive gap

D.

Usage gap

Questions 57

Which of the following is used to authenticate asymmetric keys?

Options:
A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

Questions 58

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

Options:
A.

Eradication

B.

Identification

C.

Recovery

D.

Containment

Questions 59

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

Options:
A.

RCO

B.

RTO

C.

RPO

D.

RTA

Questions 60

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:
A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Exam Code: ISSAP
Certification Provider: ISC
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Feb 8, 2025
Questions: 237