ISC2 Information Systems Security Architecture Professional ISSAP CISSP-ISSAP Exam Practice Test

Page: 1 / 14
Total 237 questions
Question 1

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.



Answer : A, D


Question 2

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?



Answer : B


Question 3

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?



Answer : C


Question 4

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?



Answer : C


Question 5

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?



Answer : B, C


Question 6

In which of the following SDLC phases are the software and other components of the system faithfully incorporated into the design specifications?



Answer : A


Question 7

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?



Answer : D


Page:    1 / 14   
Total 237 questions