ISSAP Dumps

ISSAP Free Practice Test

ISC2 ISSAP: ISSAP Information Systems Security Architecture Professional

QUESTION 61

- (Exam Topic 2)
Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Correct Answer: B

QUESTION 62

- (Exam Topic 1)
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Correct Answer: C

QUESTION 63

- (Exam Topic 1)
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Correct Answer: C

QUESTION 64

- (Exam Topic 1)
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Correct Answer: D

QUESTION 65

- (Exam Topic 1)
Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.

Correct Answer: ACD