Questions for the ISSAP were updated on : Dec 06 ,2025
Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the
presentation. Which of the following will she use to accomplish the task?
B
The security controls that are implemented to manage physical security are divided in various
groups. Which of the following services are offered by the administrative physical security control
group? Each correct answer represents a part of the solution. Choose all that apply.
A,B,F,C
You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security
reasons. The manager of the company tells you to establish connectivity between clients and servers
of the network which prevents eavesdropping and tampering of data on the Internet. Which of the
following will you configure on the network to perform the given task?
D
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that the
major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive
event occurs and asks for the other objectives of the DRP. If you are among some of the newly
recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer
represents a part of the solution. Choose three.
B,C,A
Your company is covered under a liability insurance policy, which provides various liability coverage
for information security risks, including any physical damage of assets, hacking attacks, etc. Which of
the following risk management techniques is your company using?
C
Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a
regular occurrence. Which of the following will you tell her to use to protect her computer?
A
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt
data ?
A
Which of the following are the phases of the Certification and Accreditation (C&A) process? Each
correct answer represents a complete solution. Choose two.
C,B
Which of the following is the most secure method of authentication?
D
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the
following are the likely reasons for the clustering? Each correct answer represents a complete
solution. Choose two.
B,A
Your customer is concerned about security. He wants to make certain no one in the outside world can
see the IP addresses inside his network. What feature of a router would accomplish this?
B
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In
which of the following disaster recovery tests can this task be performed?
C
Perfect World Inc., provides its sales managers access to the company's network from remote
locations. The sales managers use laptops to connect to the network. For security purposes, the
company's management wants the sales managers to log on to the network using smart cards over a
remote connection. Which of the following authentication protocols should be used to accomplish
this?
D
Which of the following authentication methods provides credentials that are only valid during a
single session?
D
Which of the following password authentication schemes enables a user with a domain account to
log on to a network once, using a password or smart card, and to gain access to multiple computers
in the domain without being prompted to log in again?
A