ISC issap practice test

Exam Title: Information Systems Security Architecture Professional

Last update: Nov 20 ,2025
Question 1

A user is sending a large number of protocol packets to a network in order to saturate its resources
and to disrupt connections to prevent communications between services. Which type of attack is
this?

  • A. Denial-of-Service attack
  • B. Vulnerability attack
  • C. Social Engineering attack
  • D. Impersonation attack
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Which of the following types of firewall functions at the Session layer of OSI model?

  • A. Circuit-level firewall
  • B. Application-level firewall
  • C. Packet filtering firewall
  • D. Switch-level firewall
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which of the following statements about a stream cipher are true? Each correct answer represents a
complete solution. Choose three.

  • A. It typically executes at a higher speed than a block cipher.
  • B. It divides a message into blocks for processing.
  • C. It typically executes at a slower speed than a block cipher.
  • D. It divides a message into bits for processing.
  • E. It is a symmetric key cipher.
Answer:

A, D,E

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 4

Which of the following types of attack can be used to break the best physical and logical security
mechanism to gain access to a system?

  • A. Social engineering attack
  • B. Cross site scripting attack
  • C. Mail bombing
  • D. Password guessing attack
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

You are the Security Consultant advising a company on security methods. This is a highly secure
location that deals with sensitive national defense related dat
a. They are very concerned about physical security as they had a breach last month. In that breach an
individual had simply grabbed a laptop and ran out of the building. Which one of the following would
have been most effective in preventing this?

  • A. Not using laptops.
  • B. Keeping all doors locked with a guard.
  • C. Using a man-trap.
  • D. A sign in log.
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

You want to implement a network topology that provides the best balance for regional topologies in
terms of the number of virtual circuits, redundancy, and performance while establishing a WAN
network. Which of the following network topologies will you use to accomplish the task?

  • A. Bus topology
  • B. Fully meshed topology
  • C. Star topology
  • D. Partially meshed topology
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the
authenticity of a certificate to be immediately verified?

  • A. RSTP
  • B. SKIP
  • C. OCSP
  • D. HTTP
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each
correct answer represents a complete solution. Choose two.

  • A. GTC
  • B. MS-CHAP v2
  • C. AES
  • D. RC4
Answer:

B,A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which of the following terms refers to a mechanism which proves that the sender really sent a
particular message?

  • A. Integrity
  • B. Confidentiality
  • C. Authentication
  • D. Non-repudiation
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement
two-factor authentication for the employees to access their networks. He has told him that he would
like to use some type of hardware device in tandem with a security or identifying pin number. Adam
decides to implement smart cards but they are not cost effective. Which of the following types of
hardware devices will Adam use to implement two-factor authentication?

  • A. Biometric device
  • B. One Time Password
  • C. Proximity cards
  • D. Security token
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 23
Viewing questions 1-10 out of 237
Go To
page 2