ISC ISSAP Exam Questions

Questions for the ISSAP were updated on : Dec 06 ,2025

Page 1 out of 16. Viewing questions 1-15 out of 237

Question 1

Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the
presentation. Which of the following will she use to accomplish the task?

  • A. Mark as final
  • B. Digital Signature
  • C. Restrict Permission
  • D. Encrypt Document
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

The security controls that are implemented to manage physical security are divided in various
groups. Which of the following services are offered by the administrative physical security control
group? Each correct answer represents a part of the solution. Choose all that apply.

  • A. Construction and selection
  • B. Site management
  • C. Awareness training
  • D. Access control
  • E. Intrusion detection
  • F. Personnel control
Answer:

A,B,F,C

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 3

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security
reasons. The manager of the company tells you to establish connectivity between clients and servers
of the network which prevents eavesdropping and tampering of data on the Internet. Which of the
following will you configure on the network to perform the given task?

  • A. WEP
  • B. IPsec
  • C. VPN
  • D. SSL
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited
personnel in the field of security management. She is giving a tutorial on DRP. She explains that the
major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive
event occurs and asks for the other objectives of the DRP. If you are among some of the newly
recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer
represents a part of the solution. Choose three.

  • A. Guarantee the reliability of standby systems through testing and simulation.
  • B. Protect an organization from major computer services failure.
  • C. Minimize the risk to the organization from delays in providing services.
  • D. Maximize the decision-making required by personnel during a disaster.
Answer:

B,C,A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Your company is covered under a liability insurance policy, which provides various liability coverage
for information security risks, including any physical damage of assets, hacking attacks, etc. Which of
the following risk management techniques is your company using?

  • A. Risk acceptance
  • B. Risk avoidance
  • C. Risk transfer
  • D. Risk mitigation
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a
regular occurrence. Which of the following will you tell her to use to protect her computer?

  • A. UPS
  • B. Multimeter
  • C. SMPS
  • D. CMOS battery
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt
data ?

  • A. Asymmetric
  • B. Hashing
  • C. Numeric
  • D. Symmetric
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following are the phases of the Certification and Accreditation (C&A) process? Each
correct answer represents a complete solution. Choose two.

  • A. Detection
  • B. Continuous Monitoring
  • C. Initiation
  • D. Auditing
Answer:

C,B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following is the most secure method of authentication?

  • A. Smart card
  • B. Anonymous
  • C. Username and password
  • D. Biometrics
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the
following are the likely reasons for the clustering? Each correct answer represents a complete
solution. Choose two.

  • A. Reduce power consumption
  • B. Ease of maintenance
  • C. Failover
  • D. Load balancing
Answer:

B,A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Your customer is concerned about security. He wants to make certain no one in the outside world can
see the IP addresses inside his network. What feature of a router would accomplish this?

  • A. Port forwarding
  • B. NAT
  • C. MAC filtering
  • D. Firewall
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In
which of the following disaster recovery tests can this task be performed?

  • A. Full-interruption test
  • B. Parallel test
  • C. Simulation test
  • D. Structured walk-through test
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Perfect World Inc., provides its sales managers access to the company's network from remote
locations. The sales managers use laptops to connect to the network. For security purposes, the
company's management wants the sales managers to log on to the network using smart cards over a
remote connection. Which of the following authentication protocols should be used to accomplish
this?

  • A. Challenge Handshake Authentication Protocol (CHAP)
  • B. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
  • C. Open Shortest Path First (OSPF)
  • D. Extensible Authentication Protocol (EAP)
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following authentication methods provides credentials that are only valid during a
single session?

  • A. Kerberos v5
  • B. Smart card
  • C. Certificate
  • D. Token
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following password authentication schemes enables a user with a domain account to
log on to a network once, using a password or smart card, and to gain access to multiple computers
in the domain without being prompted to log in again?

  • A. Single Sign-On
  • B. One-time password
  • C. Dynamic
  • D. Kerberos
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2