Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams


Free ISSAP Sample Questions:

Q: 1
An organization wants to allow a certificate authority to gain access to the encrypted data and create digital signatures on behalf of the user. The data is encrypted using the public key from a user's certificate. Which of the following processes fulfills the above requirements?
A. Key storage
B. Key recovery
C. Key revocation
D. Key escrow
Answer: D

Q: 2
You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?
A. Gap analysis
B. Vulnerability analysis
C. Requirement analysis
D. Cost-benefit analysis
Answer: A

Q: 3
Which of the following types of ciphers operates on a group of bits rather than an individual character or bit of a message?
A. Substitution cipher
B. Stream cipher
C. Classical cipher
D. Block cipher
Answer: D

Q: 4
Fill in the blank with the appropriate encryption system. The encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie-Hellman key agreement.
A. The ElGamal encryption system is an asymmetric key encryption algorithm for the publickey cryptography, which is based on the Diffie-Hellman key agreement.
Answer: A

Q: 5
Which of the following is the technology of indoor or automotive environmental comfort?
Answer: A

Q: 6
You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access. You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read, write, or alter) for his product. Which of the following access control models will you use to accomplish this task?
A. Role-based access control (RBAC)
B. Access control list (ACL)
C. Discretionary access control (DAC)
D. Mandatory access control (MAC)
Answer: C

Q: 7
Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?
A. Administrative access control
B. Physical access control
C. Technical access control
D. Detective access control
Answer: B

Q: 8
You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?
A. Router
B. Repeater
C. Switch
D. Hub
Answer: B

Q: 9
You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?
A. RC4
Answer: D

Q: 10
You work as a Chief Security Officer for Tech Perfect Inc. The company has a TCP/IP based network. You want to use a firewall that can track the state of active connections of the network and then determine which network packets are allowed to enter through the firewall.
Which of the following firewalls has this feature?
A. Application gateway firewall
B. Dynamic packet-filtering firewall
C. Stateful packet inspection firewall
D. Proxy-based firewall
Answer: B

Q: 11
John works as a Network Administrator for NetPerfect Inc. The company has a Windowsbased network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?
A. Mesh
B. Star
C. Bus
D. Ring
Answer: A

Q: 12
Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?
A. PCBC mode
B. CBC mode
C. OFB mode
D. CFB mode
Answer: C

Q: 13
Which of the following tenets does the CIA triad provide for which security practices are measured?
Each correct answer represents a part of the solution. Choose all that apply.
A. Accountability
B. Integrity
C. Confidentiality
D. Availability
Answer: C, B, D

Q: 14
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?
A. Certification Practice Statement
B. Certification Authority
C. Certificate Revocation List
D. Certificate Policy
Answer: C

Q: 15
An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?
A. Discretionary access control (DAC)
B. Network-based access control (NBAC)
C. Mandatory Access Control (MAC)
D. Role-based access control (RBAC)
Answer: D

© 2014, All Rights Reserved