- Expert Verified, Online, Free.

MAIL US

info@examtopicspro.com

ISC ISSAP Exam Questions and Updated Info

Certification Exams

Downloadable PDF versions

100% Confidential

Updated Regularly

Advanced Features

Number Of Questions

237

$ 39

Description

Exam Name: Information Systems Security Architecture Professional
Exam Code: ISSAP CISSP-ISSAP
Related Certification(s): ISC2 Certified Information Systems Security Professional CISSP Certification
Certification Provider: ISC2
Actual Exam Duration: 150 Minutes
Number of ISSAP practice questions in our database: 237
Expected ISSAP Exam Topics, as suggested by ISC2 :
  • Module 1: Evaluate Security architecture models and frameworks/ Security Architecture Modeling
  • Module 2: Integrate security principles into applications development/ Architect for Governance, Compliance and Risk Management
  • Module 3: Identity and Access Management (IAM) Architecture/ Design a security operations architecture
  • Module 4: Architect for Application Security/ Produce an identity and access management architecture
  • Module 5: Security Operations Architecture/ Develop an infrastructure security program
  • Module 6: Create an Information Security Architecture that meets the requirements of governance/ Infrastructure Security Architecture

Q1. Which of the following are natural environmental threats that an organization faces? Each correct answer represents a complete solution. Choose two.

A.Strikes

B. Floods

C. Accidents

D. Storms

Correct Answer: B, D

Q2. In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

A.Ring topology

B. Tree topology

C. Star topology

D. Mesh topology

Correct Answer: A

Q3. John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

A.Blowfish

B. Twofish

C. RSA

D. Diffie-Hellman

Correct Answer: D

Q4. Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

A.Cipher feedback mode

B. Cipher block chaining mode

C. Output feedback mode

D. Electronic codebook mode

Correct Answer: D

Q5. Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

A.Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Correct Answer: D

$ 39

Frequently Asked Questions

ExamTopics Pro is a premium service offering a comprehensive collection of exam questions and answers for over 1000 certification exams. It is regularly updated and designed to help users pass their certification exams confidently.
Please contact team@examtopics.com and we will provide you with alternative payment options.
The subscriptions at Examtopics.com are recurring according to the Billing Cycle of your Subscription Plan, i.e. after a certain period of time your credit card is re-billed automatically until/unless you cancel your subscription.
Free updates are available for the duration of your subscription, after the subscription is expired, your access will no longer be available.