Information Systems Security Architecture Professional

Here you have the best ISC CISSP-ISSAP practice exam questions

  • You have 107 total questions to study from
  • Each page has 5 questions, making a total of 22 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 15, 2024
Question 1 of 107

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?

    Correct Answer: D

    The usage gap measures the difference between the total potential for a market and the actual current usage by all consumers in the market. This gap represents the untapped segment of the market that could be reached if the product or service were used to its full potential. Other options, such as project gap, product gap, and competitive gap, do not specifically measure this difference between market potential and actual usage.

Question 2 of 107

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

    Correct Answer: B

    Packet filtering is the process of examining each packet that passes through a firewall to determine whether it should be allowed or denied based on a set of predefined rules. It involves analyzing the packet's characteristics, such as source and destination IP addresses, ports, and protocols. This method is used to control network traffic and enforce security policies, making it the correct term for allowing or restricting specific types of packets from crossing over a firewall.

Question 3 of 107

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?

    Correct Answer: A

    To encrypt emails, PGP (Pretty Good Privacy) is the appropriate choice. PGP provides end-to-end encryption, which ensures that the email content is encrypted at the sender's side and can only be decrypted by the intended recipient using their private key. This makes it highly secure for email encryption purposes. Other options like PPTP are used for VPN connections, IPSec is used for securing network communications, and NTFS is a file system without direct email encryption capabilities.

Question 4 of 107

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

    Correct Answer: A

    To securely connect remote users to the private network over the Internet, Peter should use IP Security (IPSec) in combination with Layer 2 Tunneling Protocol (L2TP). L2TP establishes the tunnel, while IPSec provides the necessary encryption to ensure that the transmitted data remains confidential and secure. This combination is a common practice for creating secure Virtual Private Network (VPN) connections, protecting data from unauthorized access or interception.

Question 5 of 107

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

    Correct Answer: D

    IGMP (Internet Group Management Protocol) is the correct protocol that multicasts messages and information among all member devices in an IP multicast group. IGMP is used to manage the membership of Internet Protocol multicast groups. It allows a host to inform a router that it wants to receive transmissions addressed to a specific multicast group, ensuring that multicast traffic is only sent to interested devices.