Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CISSP-ISSAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 25

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?

A.

Service-oriented architecture

B.

Sherwood Applied Business Security Architecture

C.

Service-oriented modeling framework

D.

Service-oriented modeling and architecture

Full Access
Question # 26

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

Firewall security

C.

Cryptography

D.

OODA loop

Full Access
Question # 27

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Full Access
Question # 28

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

Full Access
Question # 29

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

A.

Authenticity

B.

Globalization

C.

Mobility

D.

Integrity

E.

Confidentiality

F.

Nonrepudiation

Full Access
Question # 30

Which of the following algorithms is found to be suitable for both digital signature and encryption?

A.

SHA-1

B.

MD5

C.

AES

D.

RSA

Full Access
Question # 31

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

A.

Pairwise Transient Key

B.

Group Temporal Key

C.

Private Key

D.

Pairwise Master Key

Full Access
Question # 32

Which of the following layers of the OSI model provides non-repudiation services?

A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Full Access
Go to page: