Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC ISSAP - ISSAP Information Systems Security Architecture Professional

Page: 4 / 8
Total 237 questions

In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?

A.

Gap analysis

B.

Requirement analysis

C.

Cost-benefit analysis

D.

Vulnerability analysis

Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?

A.

Block cipher

B.

Classical cipher

C.

Substitution cipher

D.

Stream cipher

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

A.

DES

B.

Blowfish

C.

RC5

D.

Diffie-Hellman

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

A.

Spoofing

B.

Packet sniffing

C.

Tunneling

D.

Packet filtering

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

A.

Authenticity

B.

Globalization

C.

Mobility

D.

Integrity

E.

Confidentiality

F.

Nonrepudiation

Which of the following algorithms is found to be suitable for both digital signature and encryption?

A.

SHA-1

B.

MD5

C.

AES

D.

RSA

Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

A.

Integrity

B.

Accountability

C.

Availability

D.

Confidentiality

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

A.

In order to digitally sign an electronic record, a person must use his/her public key.

B.

In order to verify a digital signature, the signer's private key must be used.

C.

In order to digitally sign an electronic record, a person must use his/her private key.

D.

In order to verify a digital signature, the signer's public key must be used.

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A.

The transport layer

B.

The presentation layer

C.

The session layer

D.

The application layer

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge