ISSAP Dumps

ISSAP Free Practice Test

ISC2 ISSAP: ISSAP Information Systems Security Architecture Professional

QUESTION 16

- (Exam Topic 1)
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Correct Answer: A

QUESTION 17

- (Exam Topic 1)
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Correct Answer: C

QUESTION 18

- (Exam Topic 1)
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

Correct Answer: A

QUESTION 19

- (Exam Topic 2)
Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?

Correct Answer: B

QUESTION 20

- (Exam Topic 1)
Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Correct Answer: D