New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC ISSAP Practice Exam with Questions & Answers | Set: 7

Questions 61

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Options:
A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

ISC ISSAP Premium Access
Questions 62

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:
A.

Buffer-overflow attack

B.

Man-in-the-middle attack

C.

Shoulder surfing attack

D.

Denial-of-Service (DoS) attack

Questions 63

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Options:
A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Questions 64

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Questions 65

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

Options:
A.

RBAC

B.

MAC

C.

CIA

D.

DAC

Questions 66

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

Options:
A.

Blowfish

B.

Twofish

C.

RSA

D.

Diffie-Hellman

Questions 67

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:
A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Questions 68

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

Options:
A.

It uses symmetric key pairs.

B.

It provides security using data encryption and digital signature.

C.

It uses asymmetric key pairs.

D.

It is a digital representation of information that identifies users.

Questions 69

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:
A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Questions 70

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

Options:
A.

Hacking

B.

Packet filtering

C.

Web caching

D.

Spoofing

Exam Code: ISSAP
Certification Provider: ISC
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Feb 6, 2025
Questions: 237