Download Information Systems Security Architecture Professional.CISSP-ISSAP.ExamTopics.2026-04-27.108q.tqb

Vendor: ISC
Exam Code: CISSP-ISSAP
Exam Name: Information Systems Security Architecture Professional
Date: Apr 27, 2026
File Size: 343 KB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.
  1. Parking lot
  2. All hallways
  3. Server Rooms
  4. All offices
  5. All entrance doors
Correct answer: C, E
Question 2
Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution.
Choose all that apply.
  1. Kerberos requires continuous availability of a central server.
  2. Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.
  3. Kerberos builds on Asymmetric key cryptography and requires a trusted third party.
  4. Kerberos requires the clocks of the involved hosts to be synchronized.
Correct answer: A, B, D
Question 3
The security controls that are implemented to manage physical security are divided in various groups. Which of the following services are offered by the administrative physical security control group? Each correct answer represents a part of the solution. Choose all that apply.
  1. Construction and selection
  2. Site management
  3. Awareness training
  4. Access control
  5. Intrusion detection
  6. Personnel control
Correct answer: A, B, C
Question 4
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?
  1. WEP
  2. IPsec
  3. VPN
  4. SSL
Correct answer: D
Question 5
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
  1. Block cipher
  2. Stream cipher
  3. Transposition cipher
  4. Message Authentication Code
Correct answer: A, B, D
Question 6
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries.
But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
  1. Identification
  2. Eradication
  3. Recovery
  4. Contamination
  5. Preparation
Correct answer: B, C, D
Question 7
You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.
  1. It relies upon a system of security associations.
  2. It provides key generation mechanisms.
  3. It authenticates communicating peers.
  4. It protects against threats, such as DoS attack, replay attack, etc.
Correct answer: B, C, D
Question 8
You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.
  1. Layer 3
  2. Layer 2
  3. Layer 4
  4. Layer 1
Correct answer: A, B, D
Question 9
An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.
  1. Detective access control
  2. Corrective access control
  3. Administrative access control
  4. Preventive access control
Correct answer: A, B, D
Question 10
You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?
  1. BitLocker
  2. Smart Cards
  3. Service Accounts
  4. AppLocker
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!