CISSP-ISSAP Practice Questions
244 real CISSP-ISSAP exam questions with expert-verified answers and explanations. Page 1 of 5.
- Question #1Infrastructure Security
You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very conc...
Physical SecurityAccess ControlMan-trapBreach Prevention - Question #2Infrastructure Security
You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establ...
Network TopologyWAN DesignNetwork RedundancyPerformance Optimization - Question #3Identity and Access Management (IAM) Architecture
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?
Certificate RevocationOCSPPKICertificate Validation - Question #4Identity and Access Management (IAM) Architecture
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.
PEAPEAPAuthentication ProtocolsNetwork Authentication - Question #5Architect for Governance, Risk, and Compliance
(ISC)2 CISSP-ISSAP Exam Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
Non-repudiationSecurity principlesInformation security conceptsAccountability - Question #6Identity and Access Management (IAM) Architecture
Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him...
Two-factor authenticationHardware tokensAuthentication methodsIdentity and Access Management - Question #7Infrastructure Security
Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symm...
CryptographySymmetric Key EncryptionBlock CiphersNetwork Encryption - Question #8Infrastructure Security
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Network ProtocolsPublic-key CryptographyAuthenticationSSH - Question #9Infrastructure Security
Which of the following cryptographic system services ensures that information will not be (ISC)2 CISSP-ISSAP Exam disclosed to any unauthorized person on a local network?
CryptographyConfidentialitySecurity ServicesNetwork Security - Question #10Infrastructure Security
Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.
Technical ControlsSecurity ControlsNetwork SecurityAccess Control - Question #11Security Architecture Modeling
Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.
CIA TriadSecurity PrinciplesInformation Security FundamentalsSecurity Models - Question #12Identity and Access Management (IAM) Architecture
A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX s...
Social EngineeringHelpdesk SecurityPrivileged Access ManagementHuman Factor - Question #13Infrastructure Security
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem? (ISC)2 CISSP-...
DNS resolutionNetwork troubleshootingNetwork utilitiesTCP/IP - Question #14Infrastructure Security
The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this...
IPSecIPcompNetwork CompressionSecurity Protocols - Question #15Architect for Governance, Risk, and Compliance
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Delive...
Enterprise Security ArchitectureSABSA FrameworkRisk-driven SecuritySecurity Architecture Methodology - Question #16Infrastructure Security
A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that appl...
Network TopologyBus TopologyNetwork FailureTerminators - Question #17Infrastructure Security
Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero tu...
Input devicesPeripheralsControl systemsHardware - Question #18Identity and Access Management (IAM) Architecture
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Shoulder surfingSocial engineeringPhysical observationCredential theft - Question #19Infrastructure Security
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. C...
Digital SignaturesPublic Key CryptographyAsymmetric CryptographyNon-repudiation - Question #20Identity and Access Management (IAM) Architecture
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
Multi-factor Authentication (MFA)Authentication FactorsIdentity and Access Management - Question #21Security Operations Architecture
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics...
Incident Response PhasesMalware EradicationSecurity OperationsIncident Handling Process - Question #22Identity and Access Management (IAM) Architecture
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have t...
Access Control ModelsMandatory Access Control (MAC)Discretionary Access Control (DAC)Security Policy Enforcement - Question #23Infrastructure Security
Which of the following protocols provides connectionless integrity and data origin authentication of IP packets?
IPsecAuthentication Header (AH)Network Security ProtocolsData Integrity - Question #24Identity and Access Management (IAM) Architecture
The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?
Access Control ModelsDACACLsIdentity Management - Question #25Security Operations Architecture
Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?
Business Continuity PlanningDependency MappingCritical Path Analysis - Question #26Infrastructure Security
Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?
Power protectionUninterrupted Power Supply (UPS)Electrical power qualityInfrastructure availability - Question #27Architect for Governance, Risk, and Compliance
You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be...
Gap analysisBusiness analysisStrategic planningOrganizational assessment - Question #28Infrastructure Security
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol...
SSHEncryption AlgorithmsNetwork ProtocolsCryptography - Question #29Architect for Application Security
Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods wil...
Symmetric EncryptionCryptography BasicsE-commerce Security - Question #30Infrastructure Security
(ISC)2 CISSP-ISSAP Exam Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, prov...
CryptographyCommunication SecurityNetwork Security - Question #31Infrastructure Security
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two of...
VPNTunneling protocolsL2TPNetwork Security Protocols - Question #32Infrastructure Security
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of t...
Network TopologyNetwork RedundancyFault ToleranceInfrastructure Design - Question #33Infrastructure Security
Which of the following encryption algorithms are based on block ciphers?
CryptographyBlock CiphersStream CiphersEncryption Algorithms - Question #34Infrastructure Security
(ISC)2 CISSP-ISSAP Exam Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaint...
Wireless securityWEPShared key authenticationNetwork authentication - Question #35Infrastructure Security
The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI l...
OSI ModelNetworking FundamentalsProtocol StacksLayer Functions - Question #36Infrastructure Security
Which of the following is the technology of indoor or automotive environmental comfort?
HVACEnvironmental controlsPhysical securityFacility infrastructure - Question #37Infrastructure Security
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?
VPN protocolsCertificate-based authenticationL2TP/IPsecNetwork security - Question #38Security Architecture Modeling
Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.
Historical CiphersSubstitution CiphersTransposition CiphersCryptography Fundamentals - Question #39Identity and Access Management (IAM) Architecture
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.
Access Control AttacksAuthentication AttacksDenial of ServiceSpoofing - Question #40Identity and Access Management (IAM) Architecture
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
Authentication ProtocolsEAPCertificatesTLS - Question #41Architect for Governance, Risk, and Compliance
You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?
Risk ManagementAsset ValuationQuantitative Risk AnalysisALE - Question #42Infrastructure Security
browser's address bar, you are able to access the site. But, you are unable to access the site (ISC)2 CISSP-ISSAP Exam
DNSName ResolutionWeb AccessNetwork Infrastructure - Question #43Architect for Application Security
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need...
Gap analysisSoftware developmentRequirements management - Question #44Architect for Governance, Risk, and Compliance
Which of the following processes identifies the threats that can impact the business continuity of operations?
Business Continuity PlanningBusiness Impact AnalysisThreat IdentificationOperations Resilience - Question #45Identity and Access Management (IAM) Architecture
What are the benefits of using AAA security service in a network? Each correct answer represents a part of the solution. Choose all that apply.
AAANetwork Access ControlScalabilityFlexibility - Question #46Architect for Application Security
In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?
SDLCProgramming PhaseImplementationSoftware Development - Question #47Security Architecture Modeling
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
Service-oriented ArchitectureSOA LifecycleLogical DesignService Relationships - Question #48Identity and Access Management (IAM) Architecture
Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.
Authentication methodsMutual authenticationEAPCHAP - Question #49Infrastructure Security
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
Wi-Fi SecurityKey DerivationEAPPairwise Master Key (PMK) - Question #50Identity and Access Management (IAM) Architecture
Which of the following schemes is used by the Kerberos authentication?
KerberosAuthentication ProtocolsSymmetric CryptographyPrivate Key Cryptography