ISC CISSP-ISSAP Exam (page: 8)
ISC CISSP-ISSAP Information Systems Security Architecture Professional
Updated on: 06-Apr-2026

Viewing Page 8 of 50

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network.
Which of the following phases of the Incident handling process should you follow next to handle this incident?

  1. Containment
  2. Preparation
  3. Recovery
  4. Identification

Answer(s): A

Explanation:

After the identification of the DOS attack, you need to disconnect the link to the network from which the attack is being performed. The
Containment phase should be followed until the eradication and recovery from the attack is done. The Containment phase of the Incident handling process is responsible for supporting and building up the incident combating process. It ensures the stability of the system and also confirms that the incident does not get any worse. The Containment phase includes the process of preventing further contamination of the system or network, and preserving the evidence of the contamination.

Answer option D is incorrect. The Identification phase of the Incident handling process is the stage at which the Incident handler evaluates the critical level of an incident for an enterprise or system. It is an important stage where the distinction between an event and an incident is determined, measured and tested.
Answer option C is incorrect. The Recovery phase of the Incident handling process is the stage at which the enterprise or the system is settled back to its balanced production state. It involves the quality assurance tests and re-evaluation of the system for the purpose of the system revival or recovery.
Answer option B is incorrect. The preparation phase of the Incident handling process is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise. Preparation is the phase of the Incident handling, which involves different processes that are as follows:
Establishing applicable policies
Building relationships with key players
Building a response kit
Establish communication plan
Creating incident checklists
Performing threat modeling
Building an incident response team



You have decided to implement video surveillance in your company in order to enhance network security.
Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

  1. Parking lot
  2. All hallways
  3. Server Rooms
  4. All offices
  5. All entrance doors

Answer(s): A,E

Explanation:

The minimum coverage area for cameras to protect your network resources would be all entrance doors (that allows you to see everyone that comes and goes) and the server rooms (you can see anyone doing anything with the servers). Answer option B is incorrect. Anyone leaving the building with hardware or data would be detected by the entrance way cameras. Hallway cameras add extra expense with no real extra protection for the network. Answer option A is incorrect. The only purpose (for protecting the network) of monitoring the parking lot is to see who enters and leaves. That is already accomplished with the entrance way cameras.

Answer option D is incorrect. This would involve a level of monitoring well beyond the minimum. It is also likely to make employees very uncomfortable with that level of scrutiny.



You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs.
What will you implement to accomplish this?

  1. Microsoft Internet Information Server (IIS)
  2. VPN
  3. FTP server
  4. Certificate server

Answer(s): D

Explanation:

You will implement certificate server to use public key and private key pairs for secure communication on the intranet. Certificate server is a standards-based, highly customizable server program for managing the creation, issuance, and renewal of digital certificates. It uses public key cryptography that is a technology widely used for secure communication on a network such as intranet or Internet. Public key cryptography uses two types of keys, a public key and a private key. The public key is available to everyone, while the private or secret key is available only to the recipient of the message. For example, when a user sends a message or data to another user, the sender uses a public key to encrypt the data. The receiver uses his private key to decrypt the data. Public key cryptography is the most secure cryptographic implementation.
Answer options B is incorrect. VPN stands for virtual private network. It allows users to use the Internet as a secure pipeline to their corporate local area networks (LANs). Remote users can dial-in to any local Internet Service Provider (ISP) and initiate a VPN session to connect to their corporate LAN over the Internet. Companies using VPNs significantly reduce long- distance dial-up charges. VPNs also provide remote employees with an inexpensive way of remaining connected to their company's LAN for extended periods.
Answer option A is incorrect. Microsoft Internet Information Server (IIS) is a Web and application server for the Internet and private intranets.
IIS receives requests from users on the network using the World Wide Web (WWW) service and transmits information using the Hypertext
Transport Protocol (HTTP). IIS uses Microsoft Transaction Server (MTS) to provide security, performance, and scalability with server side packages.



Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

  1. CHAP
  2. PEAP
  3. EAP
  4. EAP-TLS

Answer(s): A

Explanation:

Challenge Handshake Authentication Protocol (CHAP) involves comparison of two values calculated using the Message Digest (MD5) hashing function. Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that uses a secure form of encrypted authentication. Using CHAP, network dial-up connections are able to securely connect to almost all

PPP servers.
Answer option C is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol that provides support for a wide range of authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol
(PPP), which allows the application of arbitrary authentication mechanisms for the validation of a PPP connection.
Answer option D is incorrect. Extensible Authentication Protocol-Transport Level Security (EAP-TLS) is an authentication protocol, which provides mutual authentication, integrity-protected negotiation of cryptographic service providers, and a secret key exchange between two systems that use public key cryptography. EAP-TLS works on a network that is configured for public key infrastructure (PKI) and uses certificates for authentication. These certificates can be stored on computers or on smart cards. Answer option B is incorrect. The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. The purpose was to correct deficiencies in
EAP; EAP assumed a protected communication channel, such as that provided by physical security.



Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  1. Risk analysis
  2. OODA loop
  3. Cryptography
  4. Firewall security

Answer(s): C

Explanation:

Cryptography is responsible for the encoding of messages, and securing the messages during a network communication. Cryptography is a technique of encrypting and decrypting messages.
When the text is encrypted, it is unreadable by humans.
When the text is decrypted, it is readable by the humans. The terms used in cryptography are as follows:
Plaintext: This text can be read by a user.
Ciphertext: This text can be converted to a non-readable format. Encryption: It is the process of creating a ciphertext from a plaintext. Decryption: It is the process of converting a ciphertext to a plaintext. Cipher: It is an algorithm that is used to encrypt and decrypt text. Key: Keys are the elements that are used in the technology of encrypting and decrypting text. Answer option A is incorrect. Risk analysis is the science of risks and their probability and evaluation in a business or a process. It is an important factor in security enhancement and prevention in a system. Risk analysis should be performed as part of the risk management process for each project. The outcome of the risk analysis would be the creation or review of the risk register to identify and quantify risk elements to the project and their potential impact.
Answer option B is incorrect. The OODA loop (for observe, orient, decide, and act) is a concept originally applied to the combat operations process, often at the strategic level in both military and business operations. It is now also often applied to understand commercial operations and learning processes. The concept was developed by military strategist and USAF Colonel John Boyd.



Viewing Page 8 of 50



Share your comments for ISC CISSP-ISSAP exam with other users:

Itumeleng 1/6/2024 12:53:00 PM

im preparing for exams
Anonymous


MS 1/19/2024 2:56:00 PM

question no: 42 isnt azure vm an iaas solution? so, shouldnt the answer be "no"?
Anonymous


keylly 11/28/2023 10:10:00 AM

im study azure
Anonymous


dorcas 9/22/2023 8:08:00 AM

i need this now
Anonymous


treyf 11/9/2023 5:13:00 AM

i took the aws saa-c03 test and scored 935/1000. it has all the exam dumps and important info.
UNITED STATES


anonymous 1/11/2024 4:50:00 AM

good questions
Anonymous


Anjum 9/23/2023 6:22:00 PM

well explained
Anonymous


Thakor 6/7/2023 11:52:00 PM

i got the full version and it helped me pass the exam. pdf version is very good.
INDIA


sartaj 7/18/2023 11:36:00 AM

provide the download link, please
INDIA


loso 7/25/2023 5:18:00 AM

please upload thank.
THAILAND


Paul 6/23/2023 7:12:00 AM

please can you share 1z0-1055-22 dump pls
UNITED STATES


exampei 10/7/2023 8:14:00 AM

i will wait impatiently. thank youu
Anonymous


Prince 10/31/2023 9:09:00 PM

is it possible to clear the exam if we focus on only these 156 questions instead of 623 questions? kindly help!
Anonymous


Ali Azam 12/7/2023 1:51:00 AM

really helped with preparation of my scrum exam
Anonymous


Jerman 9/29/2023 8:46:00 AM

very informative and through explanations
Anonymous


Jimmy 11/4/2023 12:11:00 PM

prep for exam
INDONESIA


Abhi 9/19/2023 1:22:00 PM

thanks for helping us
Anonymous


mrtom33 11/20/2023 4:51:00 AM

i prepared for the eccouncil 350-401 exam. i scored 92% on the test.
Anonymous


JUAN 6/28/2023 2:12:00 AM

aba questions to practice
UNITED STATES


LK 1/2/2024 11:56:00 AM

great content
Anonymous


Srijeeta 10/8/2023 6:24:00 AM

how do i get the remaining questions?
INDIA


Jovanne 7/26/2022 11:42:00 PM

well formatted pdf and the test engine software is free. well worth the money i sept.
ITALY


CHINIMILLI SATISH 8/29/2023 6:22:00 AM

looking for 1z0-116
Anonymous


Pedro Afonso 1/15/2024 8:01:00 AM

in question 22, shouldnt be in the data (option a) layer?
Anonymous


Pushkar 11/7/2022 12:12:00 AM

the questions are incredibly close to real exam. you people are amazing.
INDIA


Ankit S 11/13/2023 3:58:00 AM

q15. answer is b. simple
UNITED STATES


S. R 12/8/2023 9:41:00 AM

great practice
FRANCE


Mungara 3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.
UNITED STATES


Anonymous 7/25/2023 2:55:00 AM

need 1z0-1105-22 exam
Anonymous


Nigora 5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.
UNITED STATES


Av dey 8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle
INDIA


Mayur Shermale 11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this
JAPAN


JM 12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.
UNITED STATES


Freddie 12/12/2023 12:37:00 PM

helpful dump questions
SOUTH AFRICA