CISSP-ISSAP Dumps

CISSP-ISSAP Free Practice Test

ISC2 CISSP-ISSAP: Information Systems Security Architecture Professional

QUESTION 16

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Correct Answer: C

QUESTION 17

In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

Correct Answer: D

QUESTION 18

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

Correct Answer: C

QUESTION 19

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Correct Answer: A

QUESTION 20

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Correct Answer: B