Free Information Systems Security Architecture Professional ISSAP Exam Practice Test
ISSAP Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 237
-
John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding trainingexercises?
Answer: C Next Question -
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?
Answer: A Next Question -
Which of the following are types of asymmetric encryption algorithms? Each correct answer represents a complete solution. Choose two.
Answer: A, ,a,n,d, ,C Next Question -
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?
Answer: C Next Question -
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Answer: A Next Question -
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
Answer: B Next Question -
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?
Answer: D Next Question -
Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?
Answer: D Next Question -
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.
Answer: D, ,a,n,d, ,A Next Question -
Fill in the blank with the appropriate security device. is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integratedwith or connected to other devices that alert the user of the presence of a moving object within the field of view.
Answer: A Next Question
Total Questions: 237