Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 8
Total 71 questions
Exam Code: ISSAP                Update: Oct 15, 2025
Exam Name: ISSAP Information Systems Security Architecture Professional

ISC ISSAP Information Systems Security Architecture Professional ISSAP Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?

A.

Initiation

B.

Programming and training

C.

Design

D.

Evaluation and acceptance

Question # 2

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

A.

Asymmetric

B.

Symmetric

C.

S/MIME

D.

PGP

Question # 3

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

A.

SWIPE

B.

S/MIME

C.

SKIP

D.

SLIP

Question # 4

Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.

A.

Ethernet (IEEE 802.3)

B.

Token ring (IEEE 802.5)

C.

Fiber Distributed Data Interface (FDDI)

D.

Wireless LAN (IEEE 802.11b)

Question # 5

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

A.

Single Sign-On

B.

One-time password

C.

Dynamic

D.

Kerberos

Question # 6

Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

A.

Differential backup

B.

Incremental backup

C.

Daily backup

D.

Full backup

Question # 7

You work as a Network Administrator for McRoberts Inc. You are expanding your company's network. After you have implemented the network, you test the connectivity to a remote host by using the PING command. You get the ICMP echo reply message from the remote host. Which of the following layers of the OSI model are tested through this process? Each correct answer represents a complete solution. Choose all that apply.

A.

Layer 3

B.

Layer 2

C.

Layer 4

D.

Layer 1

Question # 8

In software development, which of the following analysis is used to document the services and functions that have been accidentally left out, deliberately eliminated or still need to be developed?

A.

Gap analysis

B.

Requirement analysis

C.

Cost-benefit analysis

D.

Vulnerability analysis

Question # 9

Which of the following methods will allow data to be sent on the Internet in a secure format?

A.

Serial Line Interface Protocol

B.

Point-to-Point Protocol

C.

Browsing

D.

Virtual Private Networks

Question # 10

Which of the following schemes is used by the Kerberos authentication?

A.

Public key cryptography

B.

One time password

C.

Private key cryptography

D.

OPIE

Page: 1 / 8
Total 71 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 15 Oct 2025