Free Information Systems Security Architecture Professional ISSAP Exam Practice Test
ISSAP Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 237
-
You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?
Answer: D Next Question -
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?Each correct answer represents a complete solution. Choose two.
Answer: B, ,a,n,d, ,A Next Question -
Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?
Answer: D Next Question -
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.
Answer: C, ,a,n,d, ,D Next Question -
Fill in the blank with the appropriate encryption system.The encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie-Hellman key agreement.
Answer: A Next Question -
Which of the following are the phases of the Certification and Accreditation (C&A) process? Each correct answer represents a complete solution. Choose two.
Answer: C, ,a,n,d, ,B Next Question -
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.
Answer: C, ,a,n,d, ,D Next Question -
You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?
Answer: B Next Question -
Which of the following protocols work at the Network layer of the OSI model?
Answer: A, ,a,n,d, ,D Next Question -
Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.
Answer: B, ,a,n,d, ,C Next Question
Total Questions: 237
