Pass4itsure > ISC > ISC Certification > ISSAP > ISSAP Online Practice Questions and Answers

ISSAP Online Practice Questions and Answers

Questions 4

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

A. Denial-of-Service attack

B. Vulnerability attack

C. Social Engineering attack

D. Impersonation attack

Buy Now
Questions 5

Which of the following types of firewall functions at the Session layer of OSI model?

A. Circuit-level firewall

B. Application-level firewall

C. Packet filtering firewall

D. Switch-level firewall

Buy Now
Questions 6

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the- middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are- secure server?

A. Blowfish

B. Twofish

C. RSA

D. Diffie-Hellman

Buy Now
Questions 7

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.company.com. What is the most likely cause?

A. The site's Web server is offline.

B. The site's Web server has heavy traffic.

C. WINS server has no NetBIOS name entry for the server.

D. DNS entry is not available for the host name.

Buy Now
Questions 8

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

A. DES

B. Blowfish

C. RC5

D. Diffie-Hellman

Buy Now
Questions 9

You are the Network Administrator for a bank. In addition to the usual security issues, you are concerned that your customers could be the victim of phishing attacks that use fake bank Web sites. Which of the following would protect against this?

A. MAC

B. Mutual authentication

C. Three factor authentication

D. Two factor authentication

Buy Now
Questions 10

The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?

A. Service-oriented business integration modeling

B. Service-oriented logical design modeling

C. Service-oriented discovery and analysis modeling

D. Service-oriented logical architecture modeling

Buy Now
Questions 11

Your customer is concerned about security. He wants to make certain no one in the outside world can see the IP addresses inside his network. What feature of a router would accomplish this?

A. Port forwarding

B. NAT

C. MAC filtering

D. Firewall

Buy Now
Questions 12

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

A. Reduce power consumption

B. Ease of maintenance

C. Failover

D. Load balancing

Buy Now
Questions 13

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

A. UPS

B. Multimeter

C. SMPS

D. CMOS battery

Buy Now
Exam Code: ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Apr 26, 2024
Questions: 237
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99