ISC CISSP-ISSAP Exam (page: 2)
ISC CISSP-ISSAP Information Systems Security Architecture Professional
Updated on: 15-Dec-2025

Viewing Page 2 of 50

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

  1. Sensor
  2. Alarm
  3. Motion detector
  4. Badge

Answer(s): D

Explanation:

A badge is a device or accoutrement that is presented or displayed to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification. It is also used in advertising, publicity, and for branding purposes.
A badge can be made from metal, plastic, leather, textile, rubber, etc., and it is commonly attached to clothing, bags, footwear, vehicles, home electrical equipment, etc.
Answer option A is incorrect. A sensor is a device that measures a physical quantity and converts it into a signal that can be read by an observer or by an instrument.
Answer option C is incorrect. A motion detector is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.
They form a vital component of comprehensive security systems, for both homes and businesses. Answer option B is incorrect. An alarm is a device that triggers a deterrent, a repellent, and a notification.



Which of the following is a method for transforming a message into a masked form, together with a way of undoing the transformation to recover the message?

  1. Cipher
  2. CrypTool
  3. Steganography
  4. MIME

Answer(s): A

Explanation:

A cipher is a cryptographic algorithm that performs encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. The cipher transforms a message into a masked form, together with a way of undoing the transformation to recover the message.
When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but it is not in a readable format. The operation of a cipher usually depends on a piece of auxiliary information, called a key or a cryptovariable. The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it is impossible to decrypt the ciphertext into plaintext. Answer option B is incorrect. CrypTool is free software and an e-learning tool illustrating cryptographic concepts.
Answer option C is incorrect. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
Answer option D is incorrect. MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet. MIME provides a mechanism for exchanging non-text information, such as binary data, audio data, video data, and foreign language text that cannot be represented in ASCII text.



Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them.
Which of the following access control models will he use?

  1. Policy Access Control
  2. Mandatory Access Control
  3. Discretionary Access Control
  4. Role-Based Access Control

Answer(s): D

Explanation:

Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization. For example, a backup administrator is responsible for taking backups of important data. Therefore, he is only authorized to access this data for backing it up. However, sometimes users with different roles need to access the same resources. This situation can also be handled using the RBAC model.
Answer option B is incorrect. Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system. Access to an object is restricted on the basis of the sensitivity of the object and granted through authorization. Sensitivity of an object is defined by the label assigned to it. For example, if a user receives a copy of an object that is marked as "secret", he cannot grant permission to other users to see this object unless they have the appropriate permission. Answer option C is incorrect. DAC is an access control model. In this model, the data owner has the right to decide who can access the data.
This model is commonly used in PC environment. The basis of this model is the use of Access Control List (ACL).
Answer option A is incorrect. There is no such access control model as Policy Access Control.



Which of the following is used to authenticate asymmetric keys?

  1. Digital signature
  2. MAC Address
  3. Demilitarized zone (DMZ)
  4. Password

Answer(s): A

Explanation:

A digital signature is used to authenticate asymmetric keys. Digital signature is a message signed with a sender's private key can be verified by anyone who has access to the sender's public key,
thereby proving that the sender signed it and that the message has not been tampered with. This is used to ensure authenticity.
Public-key cryptography, also known as asymmetric cryptography, is a form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it.
Answer option C is incorrect. Demilitarized zone (DMZ) or perimeter network is a small network that lies in between the Internet and a private network. It is the boundary between the Internet and an internal network, usually a combination of firewalls and bastion hosts that are gateways between inside networks and outside networks. DMZ provides a large enterprise network or corporate network the ability to use the Internet while still maintaining its security.
Answer options D, B are incorrect. Password and MAC address are not used to authenticate asymmetric keys.



IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption.
Which of the following encryption methods does IPsec VPN use?
Each correct answer represents a complete solution. Choose two.

  1. MD5
  2. LEAP
  3. AES
  4. 3DES

Answer(s): C,D

Explanation:

IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption using the
3DES (Triple Data Encryption Algorithm) or AES (Advanced Encryption Standard).



Viewing Page 2 of 50



Share your comments for ISC CISSP-ISSAP exam with other users:

Eman Sawalha 6/10/2023 6:18:00 AM

next time i will write a full review
GREECE


johnpaul 11/15/2023 7:55:00 AM

first time using this site
ROMANIA


omiornil@gmail.com 7/25/2023 9:36:00 AM

please sent me oracle 1z0-1105-22 pdf
BANGLADESH


John 8/29/2023 8:59:00 PM

very helpful
Anonymous


Kvana 9/28/2023 12:08:00 PM

good info about oml
UNITED STATES


Checo Lee 7/3/2023 5:45:00 PM

very useful to practice
UNITED STATES


dixitdnoh@gmail.com 8/27/2023 2:58:00 PM

this website is very helpful.
UNITED STATES


Sanjay 8/14/2023 8:07:00 AM

good content
INDIA


Blessious Phiri 8/12/2023 2:19:00 PM

so challenging
Anonymous


PAYAL 10/17/2023 7:14:00 AM

17 should be d ,for morequery its scale out
Anonymous


Karthik 10/12/2023 10:51:00 AM

nice question
Anonymous


Godmode 5/7/2023 10:52:00 AM

yes.
NETHERLANDS


Bhuddhiman 7/30/2023 1:18:00 AM

good mateial
Anonymous


KJ 11/17/2023 3:50:00 PM

good practice exam
Anonymous


sowm 10/29/2023 2:44:00 PM

impressivre qustion
Anonymous


CW 7/6/2023 7:06:00 PM

questions seem helpful
Anonymous


luke 9/26/2023 10:52:00 AM

good content
Anonymous


zazza 6/16/2023 9:08:00 AM

question 21 answer is alerts
ITALY


Abwoch Peter 7/4/2023 3:08:00 AM

am preparing for exam
Anonymous


mohamed 9/12/2023 5:26:00 AM

good one thanks
EGYPT


Mfc 10/23/2023 3:35:00 PM

only got thru 5 questions, need more to evaluate
Anonymous


Whizzle 7/24/2023 6:19:00 AM

q26 should be b
Anonymous


sarra 1/17/2024 3:44:00 AM

the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.
UNITED KINGDOM


DBS 5/14/2023 12:56:00 PM

need to attend this
UNITED STATES


Da_costa 8/1/2023 5:28:00 PM

these are free brain dumps i understand, how can one get free pdf
Anonymous


vikas 10/28/2023 6:57:00 AM

provide access
EUROPEAN UNION


Abdullah 9/29/2023 2:06:00 AM

good morning
Anonymous


Raj 6/26/2023 3:12:00 PM

please upload the ncp-mci 6.5 dumps, really need to practice this one. thanks guys
Anonymous


Miguel 10/5/2023 12:21:00 PM

question 16: https://help.salesforce.com/s/articleview?id=sf.care_console_overview.htm&type=5
SPAIN


Hiren Ladva 7/8/2023 10:34:00 PM

yes i m prepared exam
Anonymous


oliverjames 10/24/2023 5:37:00 AM

my experience was great with this site as i studied for the ms-900 from here and got 900/1000 on the test. my main focus was on the tutorials which were provided and practice questions. thanks!
GERMANY


Bhuddhiman 7/20/2023 11:52:00 AM

great course
UNITED STATES


Anuj 1/14/2024 4:07:00 PM

very good question
Anonymous


Saravana Kumar TS 12/8/2023 9:49:00 AM

question: 93 which statement is true regarding the result? sales contain 6 columns and values contain 7 columns so c is not right answer.
INDIA