Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

ISSAP Information Systems Security Architecture Professional

Last Update 21 hours ago Total Questions : 237

The ISSAP Information Systems Security Architecture Professional content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include ISSAP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISSAP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISSAP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ISSAP Information Systems Security Architecture Professional practice test comfortably within the allotted time.

Question # 4

Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?

A.

Mark as final

B.

Digital Signature

C.

Restrict Permission

D.

Encrypt Document

Question # 5

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

A.

Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B.

Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C.

application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D.

Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

Question # 6

Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

A.

IPSec

B.

PPPoE

C.

PPP

D.

TFTP

Question # 7

Which of the following layers of the OSI model provides non-repudiation services?

A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Question # 8

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

A.

Access control

Question # 9

You are responsible for security at a defense contracting firm. You are evaluating various possible encryption algorithms to use. One of the algorithms you are examining is not integer based, uses shorter keys, and is public key based. What type of algorithm is this?

A.

Symmetric

B.

None - all encryptions are integer based.

C.

Elliptic Curve

D.

RSA

Question # 10

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Go to page: