Cause all that matters here is passing the ISC2 CISSP-ISSAP exam. Cause all that you need is a high score of CISSP-ISSAP Information Systems Security Architecture Professional exam. The only one thing you need to do is downloading Pass4sure CISSP-ISSAP exam study guides now. We will not let you down with our money-back guarantee.

Q17. A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply. 

A. A break in a network cable 

B. 75 ohm terminators at open ends 

C. A powered off workstation 

D. An open-ended cable without terminators 

Answer: A,B,D 


Q18. Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer? 

A. Buffer-overflow attack 

B. Man-in-the-middle attack 

C. Shoulder surfing attack 

D. Denial-of-Service (DoS) attack 

Answer:


Q19. Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet? 

A. Risk analysis 

B. Firewall security 

C. Cryptography 

D. OODA loop 

Answer:


Q20. You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling? 

A. L2TP 

B. HTTPS 

C. SSL 

D. IPSec 

Answer:


Q21. Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two. 

A. It uses symmetric key pairs. 

B. It provides security using data encryption and digital signature. 

C. It uses asymmetric key pairs. 

D. It is a digital representation of information that identifies users. 

Answer: B,C 


Q22. Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message? 

A. Cipher 

B. CrypTool 

C. Steganography 

D. MIME 

Answer:


Q23. Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two. 

A. It is the fastest method of backing up data. 

B. It is the slowest method for taking a data backup. 

C. It backs up the entire database, including the transaction log. 

D. It backs up only the files changed since the most recent backup and clears the archive bit. 

Answer: A,D 


Q24. The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control? 

A. RBAC 

B. MAC 

C. CIA 

D. DAC 

Answer: