Certbus > ISC > ISC Certifications > ISSAP > ISSAP Online Practice Questions and Answers

ISSAP Online Practice Questions and Answers

Questions 4

You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

A. Bus topology

B. Fully meshed topology

C. Star topology

D. Partially meshed topology

Browse 237 Q&As
Questions 5

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

A. It uses symmetric key pairs.

B. It provides security using data encryption and digital signature.

C. It uses asymmetric key pairs.

D. It is a digital representation of information that identifies users.

Browse 237 Q&As
Questions 6

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A. Estimate the potential losses to assets by determining their value.

B. Establish the threats likelihood and regularity.

C. Valuations of the critical assets in hard costs.

D. Evaluate potential threats to the assets.

Browse 237 Q&As
Questions 7

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A. PPP

B. X.25

C. Frame relay

D. SLIP

Browse 237 Q&As
Questions 8

You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

A. Cost-benefit analysis

B. Gap analysis

C. Requirement analysis

D. Vulnerability analysis

Browse 237 Q&As
Questions 9

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?

A. IPSec

B. SET

C. SWIPE

D. SKIP

Browse 237 Q&As
Questions 10

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

A. Eradication phase

B. Recovery phase

C. Containment phase

D. Preparation phase

E. Identification phase

Browse 237 Q&As
Questions 11

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

A. Block cipher

B. Stream cipher

C. Transposition cipher

D. Message Authentication Code

Browse 237 Q&As
Exam Code: ISSAP
Exam Name: ISSAP - Information Systems Security Architecture Professional (ISSAP)
Last Update: Mar 17, 2025
Questions: 237 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99