ISC ISSAP - ISSAP Information Systems Security Architecture Professional
In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?
Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
Which of the following algorithms is found to be suitable for both digital signature and encryption?
Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?