Cause all that matters here is passing the ISC2 CISSP-ISSAP exam. Cause all that you need is a high score of CISSP-ISSAP Information Systems Security Architecture Professional exam. The only one thing you need to do is downloading Exambible CISSP-ISSAP exam study guides now. We will not let you down with our money-back guarantee.

Q33. You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task? 

A. Bus topology 

B. Fully meshed topology 

C. Star topology 

D. Partially meshed topology 

Answer:


Q34. Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way? 

A. Cipher feedback mode 

B. Cipher block chaining mode 

C. Output feedback mode 

D. Electronic codebook mode 

Answer:


Q35. In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions? 

A. Discretionary Access Control (DAC) 

B. Role Based Access Control (RBAC) 

C. Mandatory Access Control (MAC) 

D. Access Control List (ACL) 

Answer:


Q36. Which of the following protocols provides connectionless integrity and data origin authentication of IP packets? 

A. ESP 

B. AH 

C. IKE 

D. ISAKMP 

Answer:


Q37. You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks? 

A. Service-oriented architecture 

B. Sherwood Applied Business Security Architecture 

C. Service-oriented modeling framework 

D. Service-oriented modeling and architecture 

Answer:


Q38. Which of the following refers to a location away from the computer center where document copies and backup media are kept? 

A. Storage Area network 

B. Off-site storage 

C. On-site storage 

D. Network attached storage 

Answer:


Q39. Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand? 

A. Power Surge 

B. Power Spike 

C. Blackout 

D. Brownout 

Answer:


Q40. Which of the following types of attacks cannot be prevented by technical measures only? 

A. Social engineering 

B. Brute force 

C. Smurf DoS 

D. Ping flood attack 

Answer: