ISSAP Dumps

ISSAP Free Practice Test

ISC2 ISSAP: ISSAP Information Systems Security Architecture Professional

QUESTION 51

- (Exam Topic 2)
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?

Correct Answer: A

QUESTION 52

- (Exam Topic 1)
Which of the following authentication methods prevents unauthorized execution of code on remote systems?

Correct Answer: B

QUESTION 53

- (Exam Topic 1)
Which of the following types of attacks cannot be prevented by technical measures only?

Correct Answer: A

QUESTION 54

- (Exam Topic 2)
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

Correct Answer: C

QUESTION 55

- (Exam Topic 1)
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

Correct Answer: D