ISSAP Dumps

ISSAP Free Practice Test

ISC2 ISSAP: ISSAP Information Systems Security Architecture Professional

QUESTION 36

- (Exam Topic 2)
Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

Correct Answer: D

QUESTION 37

- (Exam Topic 1)
You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?

Correct Answer: D

QUESTION 38

- (Exam Topic 2)
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

Correct Answer: ABC

QUESTION 39

- (Exam Topic 2)
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

Correct Answer: D

QUESTION 40

- (Exam Topic 2)
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?

Correct Answer: D