Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISSAP ISC ISSAP Information Systems Security Architecture Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC ISSAP ISSAP Information Systems Security Architecture Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 4
Total 237 questions

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Integrity

B.

Confidentiality

C.

Authentication

D.

Non-repudiation

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

A.

Public-key cryptography

B.

Kerberos

C.

Preshared keys

D.

Digital certificates

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

A.

IPSec

B.

L2TP

C.

LEAP

D.

ISAKMP

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

A.

Disaster recovery planning

B.

SOA value proposition

C.

Software assets reuse

D.

Architectural components abstraction

E.

Business traceability

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

A.

L2TP

B.

HTTPS

C.

SSL

D.

IPSec

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

A.

It typically executes at a higher speed than a block cipher.

B.

It divides a message into blocks for processing.

C.

It typically executes at a slower speed than a block cipher.

D.

It divides a message into bits for processing.

E.

It is a symmetric key cipher.

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

A.

AH

B.

ESP

C.

IPcomp

D.

IKE

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A.

The transport layer

B.

The presentation layer

C.

The session layer

D.

The application layer

The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information? Each correct answer represents a complete solution. Choose all that apply.

A.

Transport layer

B.

Physical layer

C.

Data Link layer

D.

Network layer

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

A.

Star

B.

Mesh

C.

Bus

D.

Ring

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

A.

Ring topology

B.

Tree topology

C.

Star topology

D.

Mesh topology

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A.

Estimate the potential losses to assets by determining their value.

B.

Establish the threats likelihood and regularity.

C.

Valuations of the critical assets in hard costs.

D.

Evaluate potential threats to the assets.

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

A.

IDEA

B.

PGP

C.

DES

D.

AES

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Page: 1 / 4
Total 237 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved