ISSAP Practice Test Questions

237 Questions


Topic 1: Volume A

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?


A. Cipher feedback mode


B. Cipher block chaining mode


C. Output feedback mode


D. Electronic codebook mode





D.
  Electronic codebook mode

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?


A. Blowfish


B. Twofish


C. RSA


D. Diffie-Hellman





D.
  Diffie-Hellman

You work as a Security Manager for Tech Perfect Inc. A number of people are involved with you in the DRP efforts. You have maintained several different types of plan documents, intended for different audiences. Which of the following documents will be useful for you as well as public relations personnel who require a non-technical perspective on the entire organization's disaster recovery efforts?


A. Technical guide


B. Executive summary


C. Checklist


D. Department-specific plan





B.
  Executive summary

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?


A. The transport layer


B. The presentation layer


C. The session layer


D. The application layer





A.
  The transport layer

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.


A. Switch


B. Router


C. Bridge


D. Hub E. Repeater





A.
  Switch

B.
  Router

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. (Choose two).


A. Public key


B. IPsec


C. MS-CHAP


D. Symmetric





A.
  Public key

D.
  Symmetric

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?


A. IPSec


B. SET


C. SWIPE


D. SKIP





C.
  SWIPE

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.


A. Disaster recovery planning


B. SOA value proposition


C. Software assets reuse


D. Architectural components abstraction


E. Business traceability





B.
  SOA value proposition

C.
  Software assets reuse

D.
  Architectural components abstraction

E.
  Business traceability

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?


A. It represents how many times per year a specific threat occurs.


B. It represents the percentage of loss that an asset experiences if an anticipated threat occurs


C. It is expected loss for an asset due to a risk over a one year period.


D. It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.





D.
  It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. (Choose three).


A. Auditing


B. Network architecture


C. System access


D. Data backups





A.
  Auditing

B.
  Network architecture

C.
  System access

Which of the following authentication methods prevents unauthorized execution of code on remote systems?


A. TACACS


B. S-RPC


C. RADIUS


D. CHAP





B.
  S-RPC

Which of the following life cycle modeling activities establishes service relationships and message exchange paths?


A. Service-oriented logical design modeling


B. Service-oriented conceptual architecture modeling


C. Service-oriented discovery and analysis modeling


D. Service-oriented business integration modeling





A.
  Service-oriented logical design modeling


Page 7 out of 20 Pages
Previous