ISSAP Dumps

ISSAP Free Practice Test

ISC2 ISSAP: ISSAP Information Systems Security Architecture Professional

QUESTION 6

- (Exam Topic 2)
Which of the following algorithms can be used to check the integrity of a file? 158
Each correct answer represents a complete solution. Choose two.

Correct Answer: AD

QUESTION 7

- (Exam Topic 1)
Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

Correct Answer: ABD

QUESTION 8

- (Exam Topic 2)
Which of the following schemes is used by the Kerberos authentication?

Correct Answer: C

QUESTION 9

- (Exam Topic 2)
The OSI reference model is divided into layers and each layer has a specific task to perform. At which layer of OSI model is the File and Print service performed?

Correct Answer: D

QUESTION 10

- (Exam Topic 2)
Fill in the blank with the appropriate encryption system. The _____ encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie- Hellman key agreement.
Solution:
ElGamal

Does this meet the goal?

Correct Answer: A