Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISSAP ISC ISSAP Information Systems Security Architecture Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC ISSAP ISSAP Information Systems Security Architecture Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 237 questions

Which of the following is used to authenticate asymmetric keys?

A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Mandatory Access Control (MAC)

D.

Access Control List (ACL)

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

A.

RBAC

B.

MAC

C.

CIA

D.

DAC

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

A.

PGP

B.

PPTP

C.

IPSec

D.

NTFS

Which of the following devices is a least expensive power protection device for filtering the electrical stream to control power surges, noise, power sags, and power spikes?

A.

Line Conditioner

B.

Surge Suppressor

C.

Uninterrupted Power Supply (UPS)

D.

Expansion Bus

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

A.

Not using laptops.

B.

Keeping all doors locked with a guard.

C.

Using a man-trap.

D.

A sign in log.

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?

A.

Project gap

B.

Product gap

C.

Competitive gap

D.

Usage gap

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

A.

Bus topology

B.

Fully meshed topology

C.

Star topology

D.

Partially meshed topology

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

A.

Structured walk-through test

B.

Simulation test

C.

Full-interruption test

D.

Parallel test

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

A.

RCO

B.

RTO

C.

RPO

D.

RTA

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

A.

Auditing

B.

Network acchitecture

C.

System access

D.

Data backups

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

A.

Buffer-overflow attack

B.

Man-in-the-middle attack

C.

Shoulder surfing attack

D.

Denial-of-Service (DoS) attack

Which of the following uses public key cryptography to encrypt the contents of files?

A.

EFS

B.

DFS

C.

NTFS

D.

RFS

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

A.

It represents how many times per year a specific threat occurs.

B.

It represents the percentage of loss that an asset experiences if an anticipated threat occurs.

C.

It is expected loss for an asset due to a risk over a one year period.

D.

It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Page: 2 / 4
Total 237 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved