CISSP-ISSAP Practice Questions
244 real CISSP-ISSAP exam questions with expert-verified answers and explanations. Page 5 of 5.
- Question #202Identity and Access Management (IAM) Architecture
Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.
Discretionary Access Control (DAC)Access Control ModelsPermissionsData Ownership - Question #203Infrastructure Security
Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same...
Encryption modesSymmetric encryptionElectronic Codebook (ECB)Replay attacks - Question #204Identity and Access Management (IAM) Architecture
You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and...
Multi-factor authentication (MFA)Hardware tokensWeb authenticationIdentity and Access Management - Question #205Infrastructure Security
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
OSI ModelTCP/IP ModelNetwork LayersTransport Layer - Question #206Infrastructure Security
You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer la...
Physical SecurityAsset ProtectionCost-Benefit AnalysisRisk Mitigation - Question #207Architect for Governance, Risk, and Compliance
Which of the following types of attacks cannot be prevented by technical measures only?
Social engineeringAttack typesSecurity awarenessHuman factors in security - Question #208Infrastructure Security
Which of the following attacks can be overcome by applying cryptography?
CryptographyNetwork SecuritySniffingConfidentiality - Question #209Security Operations Architecture
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robber...
Physical securityCCTVSurveillanceIncident analysis - Question #210Infrastructure Security
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit has...
Hashing algorithmsCryptographic primitivesIntegrityMD5 - Question #211Identity and Access Management (IAM) Architecture
(ISC)2 CISSP-ISSAP Exam Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply...
Man-in-the-middle (MITM) attackAuthentication mechanismsSecurity countermeasuresPublic Key Infrastructure (PKI) - Question #212Infrastructure Security
Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current elect...
Power eventsBrownoutElectrical stabilityInfrastructure resilience - Question #213Infrastructure Security
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
WAN ProtocolsNetwork ArchitectureFrame RelayData Communication - Question #214Identity and Access Management (IAM) Architecture
Which of the following statements best describes a certification authority?
Certification Authority (CA)Public Key Infrastructure (PKI)Digital CertificatesIdentity Management - Question #215Infrastructure Security
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication lin...
Disaster RecoveryBusiness ContinuityHot SiteRecovery Sites - Question #216Architect for Governance, Risk, and Compliance
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Disaster Recovery PlanningDRP TestingBusiness ContinuityRoles and Responsibilities - Question #217Security Architecture Modeling
The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles doe...
Service-Oriented Modeling Framework (SOMF)Service-Oriented Architecture (SOA)Business-IT AlignmentArchitectural Principles - Question #218Infrastructure Security
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?
Networking FundamentalsOSI ModelLayer 1 DevicesMedia Converters - Question #219Infrastructure Security
In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security po...
IPSecAuthentication MethodsNetwork SecurityWindows Server - Question #220Identity and Access Management (IAM) Architecture
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
KerberosKey Distribution Center (KDC)Authentication ServiceTicket-Granting Service - Question #221Identity and Access Management (IAM) Architecture
Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Wh...
KerberosAuthentication ProtocolsSymmetric CryptographyNetwork Authentication - Question #222Infrastructure Security
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organi...
Disaster RecoveryData ReplicationHigh AvailabilityHot Site - Question #223Infrastructure Security
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?
Block cipherCryptographyCipher types - Question #224Infrastructure Security
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.
Fire suppressionFire extinguisher typesClass B fires - Question #225Architect for Governance, Risk, and Compliance
Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts. Answer: Executive su...
Disaster Recovery PlanningBusiness ContinuityExecutive SummaryDocumentation - Question #226Identity and Access Management (IAM) Architecture
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
EAP ProtocolsCertificate-based AuthenticationSecure TunnelsNetwork Access Control - Question #227Infrastructure Security
Which of the following is a form of gate that allows one person to pass at a time?
Physical securityAccess controlTurnstileEntry control - Question #228Infrastructure Security
Which of the following algorithms can be used to check the integrity of a file? Each correct answer represents a complete solution. Choose two. (ISC)2 CISSP-ISSAP Exam
Cryptographic algorithmsIntegrity checkingHash functions - Question #229Infrastructure Security
You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with...
FirewallNetwork SecurityPerimeter SecurityHardware Security - Question #230Security Architecture Modeling
The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the fol...
SOMFService-Oriented ArchitectureArchitecture ModelingLogical Design - Question #231Identity and Access Management (IAM) Architecture
You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned...
Physical SecurityVisitor ManagementAccess ControlPresence Tracking - Question #232Architect for Application Security
Which of the following security architectures defines how to integrate widely disparate applications for a world that is Web-based and uses multiple implementation platforms? (ISC)...
Service-oriented architecture (SOA)Application integrationWeb servicesArchitectural styles - Question #233Infrastructure Security
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Symmetric EncryptionCryptography FundamentalsEncryption Methods - Question #234Infrastructure Security
The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?
OSI ModelApplication LayerNetwork Services - Question #235Infrastructure Security
Which of the following cables provides maximum security against electronic eavesdropping on a network?
Network Cabling SecurityFiber Optic SecurityEavesdropping PreventionPhysical Layer Security - Question #236Identity and Access Management (IAM) Architecture
Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multi...
Single Sign-OnAuthenticationDomain AccessIdentity Management - Question #237Identity and Access Management (IAM) Architecture
Which of the following authentication methods provides credentials that are only valid during a single session?
Authentication methodsToken authenticationCredential validitySession management - Question #238Architect for Governance, Risk, and Compliance
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacki...
Risk ManagementRisk TransferInsuranceInformation Security Governance - Question #239Infrastructure Security
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She...
Disaster Recovery Planning (DRP)Business ContinuitySystem ResilienceService Availability - Question #240Architect for Governance, Risk, and Compliance
John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cos...
DRP TestingBusiness ContinuityCost-effectivenessRisk Management - Question #241Infrastructure Security
Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?
Network Security ProtocolsIP Layer SecurityConfidentiality Integrity Authentication (CIA)SWIPE - Question #242Architect for Application Security
Which of the following firewalls inspects the actual contents of packets?
Firewall typesApplication securityPacket inspectionNetwork security - Question #243Infrastructure Security
Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.
Incremental backupData backup methodsArchive bitData protection - Question #244Infrastructure Security
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choo...
Symmetric EncryptionBlock CiphersStream CiphersMessage Authentication Codes - Question #245Identity and Access Management (IAM) Architecture
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.
Access Control AttacksDenial of ServiceSpoofingAuthentication Attacks