Cyber Monday 2023! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: CM25OFF
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Information Systems Security Architecture Professional Exam

Certification Provider: ISC2
Exam Name: Information Systems Security Architecture Professional
Duration: 150 Minutes
Number of questions in our database: 249
Exam Version: Nov. 26, 2023
Exam Official Topics:
  • Topic 1: Evaluate Security architecture models and frameworks/ Security Architecture Modeling
  • Topic 2: Integrate security principles into applications development/ Architect for Governance, Compliance and Risk Management
  • Topic 3: Identity and Access Management (IAM) Architecture/ Design a security operations architecture
  • Topic 4: Architect for Application Security/ Produce an identity and access management architecture
  • Topic 5: Security Operations Architecture/ Develop an infrastructure security program
  • Topic 6: Create an Information Security Architecture that meets the requirements of governance/ Infrastructure Security Architecture

Free ISC2 Information Systems Security Architecture Professional Exam Actual Questions

The questions for Information Systems Security Architecture Professional were last updated On Nov. 26, 2023

Question #1

Which of the following is the most secure method of authentication?

Reveal Solution Hide Solution
Correct Answer: D

biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming

more common in the business environment. It is the most secure method of authentication.

Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics

authentication. Username and password can be intercepted.

Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.

Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is

not prompted for credentials.


Question #2

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a

password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Reveal Solution Hide Solution
Correct Answer: A

password to each application. In SSO, a user can access all computer applications and systems where he has access permission without

entering multiple passwords. This reduces human error and systems failure and is therefore highly desirable. There are many commercial SSO

solutions available in the market. Some of them are as follows:

Central Authentication Service (CAS)

The Dutch NREN

CoSign

Enterprise Single Sign-On (E-SSO)

Web Single Sign-On (Web SSO)

Security Assertion Markup Language (SAML)

Direct SSO

Shibboleth

Answer option B is incorrect. A one-time password (OTP) is a password only valid for a single login session or transaction. OTP avoids a

number of shortcomings that are associated with traditional passwords. The most important shortcoming that is addressed by OTP is that OTP

is not vulnerable to replay attacks. If a potential intruder manages to record an OTP that was already used to log into a service or to conduct

a transaction, he will not be able to abuse it since it will be no longer valid.

Answer option D is incorrect. Kerberos is a secure protocol that supports ticketing authentication. A ticket is granted in response to a client

computer authentication request by the Kerberos authentication server, if the request contains valid user credentials and a valid Service

Principal Name (SPN). The ticket is then used by the client computer to access network resources. To enable Kerberos authentication, the

client and server computers must have a trusted connection to the domain Key Distribution Center (KDC). The task of KDC is to distribute

shared secret keys to enable encryption.

Answer option C is incorrect. In the dynamic password authentication scheme, passwords are changed after a specified time or time interval.


Question #3

Which of the following is a form of gate that allows one person to pass at a time?

Reveal Solution Hide Solution
Correct Answer: C

enforce one-way traffic of people, and in addition, it can restrict passage only to people who insert a coin, a ticket, a pass, or similar. Thus, a

turnstile can be used in the case of paid access.

Answer option D is incorrect. A fence is a perimeter-defining device. It differentiates between those locations that are under some specified

security protection and those that are not under any security protection. Fencing contains various components, materials, and construction

methods. It also includes stripes painted on the ground, barbed wires, chain link fences, concrete walls, and some invisible perimeters in

which laser, motion, and heat detectors are used.

Answer option A is incorrect. Biometrics is a method of authentication that uses physical characteristics, such as fingerprints, scars, retinal

patterns, and other forms of biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and

retinal scanners is becoming more common in the business environment.

Answer option B is incorrect. A man-trap in modern physical security protocols refers to a small space having two sets of interlocking doors

such that the first set of doors must close before the second set opens. Identification may be required for each door, and possibly different

measures for each door. For example, a key may open the first door, but a personal identification number entered on a number pad opens the

second. Other methods of opening doors include proximity cards or biometric devices such as fingerprint readers or iris recognition scans.

'Man-traps' may be configured so that when an alarm is activated, all doors lock and trap the suspect between the doors in the 'dead-space'

or lock just one door to deny access to a secure space such as a data center or research lab.


Question #4

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a

password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Reveal Solution Hide Solution
Correct Answer: A

password to each application. In SSO, a user can access all computer applications and systems where he has access permission without

entering multiple passwords. This reduces human error and systems failure and is therefore highly desirable. There are many commercial SSO

solutions available in the market. Some of them are as follows:

Central Authentication Service (CAS)

The Dutch NREN

CoSign

Enterprise Single Sign-On (E-SSO)

Web Single Sign-On (Web SSO)

Security Assertion Markup Language (SAML)

Direct SSO

Shibboleth

Answer option B is incorrect. A one-time password (OTP) is a password only valid for a single login session or transaction. OTP avoids a

number of shortcomings that are associated with traditional passwords. The most important shortcoming that is addressed by OTP is that OTP

is not vulnerable to replay attacks. If a potential intruder manages to record an OTP that was already used to log into a service or to conduct

a transaction, he will not be able to abuse it since it will be no longer valid.

Answer option D is incorrect. Kerberos is a secure protocol that supports ticketing authentication. A ticket is granted in response to a client

computer authentication request by the Kerberos authentication server, if the request contains valid user credentials and a valid Service

Principal Name (SPN). The ticket is then used by the client computer to access network resources. To enable Kerberos authentication, the

client and server computers must have a trusted connection to the domain Key Distribution Center (KDC). The task of KDC is to distribute

shared secret keys to enable encryption.

Answer option C is incorrect. In the dynamic password authentication scheme, passwords are changed after a specified time or time interval.


Question #5

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering?

Each correct answer represents a complete solution. Choose two.

Reveal Solution Hide Solution
Correct Answer: A, B

interruption in service to customers. This is particularly important with database servers. If one fails, in a clustered environment the customer

will not even know the main database server is down.

Clustering also provides load balancing. This is critical for Web servers in high volume e-commerce situations. Clustering allows the load to be

distributed over many computers rather than focused on a single server.



Unlock all Information Systems Security Architecture Professional Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now
Disscuss ISC2 Information Systems Security Architecture Professional Topics, Questions or Ask Anything Related

Save Cancel