ISC CISSP-ISSAP ISSAP Information Systems Security Architecture Professional Online Training
ISC CISSP-ISSAP Online Training
The questions for CISSP-ISSAP were last updated at Jul 11,2025.
- Exam Code: CISSP-ISSAP
- Exam Name: ISSAP Information Systems Security Architecture Professional
- Certification Provider: ISC
- Latest update: Jul 11,2025
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value.
Which of the following should you use?
- A . AES
- B . SHA
- C . MD5
- D . DES
Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.
- A . Using public key infrastructure authentication.
- B . Using basic authentication.
- C . Using Secret keys for authentication.
- D . Using Off-channel verification.
Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?
- A . Power Surge
- B . Power Spike
- C . Blackout
- D . Brownout
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
- A . PPP
- B . X.25
- C . Frame relay
- D . SLIP
Which of the following statements best describes a certification authority?
- A . A certification authority is a technique to authenticate digital documents by using computer cryptography.
- B . A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.
- C . A certification authority is an entity that issues digital certificates for use by other parties.
- D . A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.
In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility?
- A . Hot Site
- B . Mobile Site
- C . Warm Site
- D . Cold Site
Which of the following should the administrator ensure during the test of a disaster recovery plan?
- A . Ensure that the plan works properly
- B . Ensure that all the servers in the organization are shut down.
- C . Ensure that each member of the disaster recovery team is aware of their responsibility.
- D . Ensure that all client computers in the organization are shut down.
The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations.
Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.
- A . Disaster recovery planning
- B . SOA value proposition
- C . Software assets reuse
- D . Architectural components abstraction
- E . Business traceability
You want to connect a twisted pair cable segment to a fiber-optic cable segment.
Which of the following networking devices will you use to accomplish the task?
- A . Hub
- B . Switch
- C . Repeater
- D . Router
In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers.
What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.
- A . Public-key cryptography
- B . Kerberos
- C . Preshared keys
- D . Digital certificates