CISSP-ISSAP Practice Questions
244 real CISSP-ISSAP exam questions with expert-verified answers and explanations. Page 4 of 5.
- Question #152Identity and Access Management (IAM) Architecture
Which of the following is the most secure method of authentication? (ISC)2 CISSP-ISSAP Exam
Authentication methodsBiometricsAuthentication factorsSecurity strength - Question #153Architect for Governance, Risk, and Compliance
Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.
Certification and Accreditation (C&A)Risk Management Framework (RMF)Security Governance - Question #154Identity and Access Management (IAM) Architecture
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
CryptographyAsymmetric EncryptionPublic Key CryptographyKey Pairs - Question #155Infrastructure Security
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect h...
Power ProtectionUPSInfrastructure ResilienceEnvironmental Protection - Question #156Infrastructure Security
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Shoulder SurfingSocial EngineeringPhysical SecurityInformation Disclosure - Question #157Infrastructure Security
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. C...
Digital SignaturesPublic Key CryptographyPrivate KeyPublic Key - Question #158Infrastructure Security
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients a...
Network SecuritySSL/TLSSecure CommunicationData Confidentiality - Question #159Architect for Governance, Risk, and Compliance
The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical sec...
Physical SecurityAdministrative ControlsSecurity Controls ClassificationSite Security - Question #160Identity and Access Management (IAM) Architecture
Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?
Digital SignaturesIntegrityAuthenticityNon-repudiation - Question #161Architect for Governance, Risk, and Compliance
Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?
Planning gapMarket analysisStrategic planningBusiness alignment - Question #162Infrastructure Security
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
FirewallPacket filteringNetwork securitySecurity controls - Question #163Architect for Application Security
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?
Email securityPGPCryptographic applications - Question #164Infrastructure Security
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Int...
VPNL2TPIPSecNetwork Encryption - Question #165Infrastructure Security
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
Networking protocolsMulticastIGMPIP networking - Question #166Identity and Access Management (IAM) Architecture
Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitima...
IdentificationBadgesPhysical Access ControlCredentials - Question #167Infrastructure Security
Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?
CryptographyCipherEncryptionSecurity Fundamentals - Question #168Identity and Access Management (IAM) Architecture
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will h...
Access Control ModelsRole-Based Access Control (RBAC)Least PrivilegeIdentity and Access Management - Question #169Identity and Access Management (IAM) Architecture
Which of the following is used to authenticate asymmetric keys? (ISC)2 CISSP-ISSAP Exam
Digital SignaturesAsymmetric CryptographyAuthenticationPKI - Question #170Infrastructure Security
IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPse...
IPsecVPNEncryptionCryptography - Question #171Infrastructure Security
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which ty...
DoS attackNetwork attacksAvailabilityCyberattack types - Question #172Infrastructure Security
Which of the following types of firewall functions at the Session layer of OSI model?
Firewall typesOSI modelCircuit-level firewallNetwork security - Question #173Infrastructure Security
Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.
Stream ciphersSymmetric encryptionCryptographic principlesCipher types - Question #174Infrastructure Security
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Social EngineeringSecurity BypassHuman FactorAttack Types - Question #175Architect for Application Security
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Authentication MethodsSecure RPCRemote Code ExecutionApplication Security - Question #176Infrastructure Security
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet- filtering firewall and has the capability to filter on some of the contents of...
FirewallPacket FilteringOSI ModelNetwork Layers - Question #177Infrastructure Security
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web...
SSL/TLSSymmetric EncryptionAsymmetric EncryptionWeb Security - Question #178Infrastructure Security
John works as a professional Ethical Hacker. He has been assigned the project of testing the a man-in-the-middle attack since the key exchange process of the cryptographic algorith...
Diffie-HellmanKey ExchangeMan-in-the-Middle (MITM)Cryptographic Vulnerabilities - Question #179Infrastructure Security
Which of the following electrical events shows a sudden drop of power source that can cause a wide variety of problems on a PC or a network?
BlackoutPower EventsInfrastructure ReliabilityPower Protection - Question #180Architect for Governance, Risk, and Compliance
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences ass...
Recovery Time Objective (RTO)Business ContinuityDisaster RecoveryRisk Management - Question #181Security Operations Architecture
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) f...
Incident HandlingIncident Response ProcessContainmentDoS Attack - Question #182Infrastructure Security
You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the m...
Physical SecurityVideo SurveillanceAsset ProtectionData Center Security - Question #183Infrastructure Security
You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will...
Public Key Infrastructure (PKI)Certificate ServerDigital CertificatesSecure Communication - Question #184Identity and Access Management (IAM) Architecture
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
Authentication ProtocolsCHAPMD5 Hashing - Question #185Infrastructure Security
Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and mess...
CryptographySecure CommunicationData in Transit Security - Question #186Identity and Access Management (IAM) Architecture
Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.
PKIAsymmetric CryptographyDigital SignatureEncryption - Question #187Infrastructure Security
Which of the following types of halon is found in portable extinguishers and is stored as a liquid?
HalonFire suppressionPhysical securityExtinguishers - Question #188Infrastructure Security
Mark has been hired by a company to work as a Network Assistant. He is assigned the task to configure a dial-up connection. He is configuring a laptop. Which of the following proto...
Authentication ProtocolsPassword SecurityRemote AccessNetwork Protocols - Question #189Infrastructure Security
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery p...
Disaster Recovery TestingBusiness ContinuityFull-Interruption TestInfrastructure Resilience - Question #190Infrastructure Security
In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?
Network topologiesRing topologyNetwork fundamentalsData flow - Question #191Infrastructure Security
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?
Hashing AlgorithmsCryptography FundamentalsData IntegritySecure Hashing - Question #192Infrastructure Security
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?
Physical SecurityMantrapAccess Control - Question #193Infrastructure Security
Which of the following refers to a location away from the computer center where document copies and backup media are kept?
Off-site storageBackup mediaDisaster recovery - Question #194Infrastructure Security
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents...
SSL/TLSEncryption methodsPublic-key cryptographySymmetric-key cryptography - Question #195Infrastructure Security
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the c...
SteganographyData ExfiltrationContent Filtering BypassInsider Threat - Question #196Infrastructure Security
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Intrusion Detection SystemAnomaly DetectionNetwork SecurityBaseline Analysis - Question #197Architect for Governance, Risk, and Compliance
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.
Risk Analysis ProcessAsset ValuationThreat AssessmentLikelihood Assessment - Question #198Infrastructure Security
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)? (ISC)2 CISSP-ISSAP Exam
IKEISAKMPSecurity AssociationsKey Management - Question #199Infrastructure Security
Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods wil...
Symmetric EncryptionCryptographyE-commerce SecurityTLS/SSL - Question #200Infrastructure Security
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cy...
CryptographySecure communicationsInformation securityData in transit - Question #201Infrastructure Security
An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the pub...
Key escrowCryptographyKey managementDigital signatures