Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Information Systems Security Architecture Professional Exam

Certification Provider: ISC2
Exam Name: Information Systems Security Architecture Professional
Duration: 150 Minutes
Number of questions in our database: 237
Exam Version: Apr. 15, 2024
Exam Official Topics:
  • Topic 1: Evaluate Security architecture models and frameworks/ Security Architecture Modeling
  • Topic 2: Integrate security principles into applications development/ Architect for Governance, Compliance and Risk Management
  • Topic 3: Identity and Access Management (IAM) Architecture/ Design a security operations architecture
  • Topic 4: Architect for Application Security/ Produce an identity and access management architecture
  • Topic 5: Security Operations Architecture/ Develop an infrastructure security program
  • Topic 6: Create an Information Security Architecture that meets the requirements of governance/ Infrastructure Security Architecture
Disscuss ISC2 Information Systems Security Architecture Professional Topics, Questions or Ask Anything Related

Currently there are no comments in this discussion, be the first to comment!

Free ISC2 Information Systems Security Architecture Professional Exam Actual Questions

The questions for Information Systems Security Architecture Professional were last updated On Apr. 15, 2024

Question #1

Which of the following is the most secure method of authentication?

Reveal Solution Hide Solution
Correct Answer: D

biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming

more common in the business environment. It is the most secure method of authentication.

Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics

authentication. Username and password can be intercepted.

Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.

Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is

not prompted for credentials.


Question #2

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

Reveal Solution Hide Solution
Correct Answer: A

considerable loss of information systems resources. The chief objective of a disaster recovery plan is to provide an organized way to make

decisions if a disruptive event occurs.

Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption

of applications, data, hardware, communications (such as networking), and other IT infrastructure. A business continuity plan (BCP) includes

planning for non-IT related aspects such as key personnel, facilities, crisis communication, and reputation protection, and should refer to the

disaster recovery plan (DRP) for IT-related infrastructure recovery/continuity.

Answer option C is incorrect. Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan for how an

organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster

or extended disruption. The logistical plan is called a business continuity plan.

Answer option D is incorrect. The Continuity Of Operation Plan (COOP) refers to the preparations and institutions maintained by the United

States government, providing survival of federal government operations in the case of catastrophic events. It provides procedures and

capabilities to sustain an organization's essential. COOP is the procedure documented to ensure persistent critical operations throughout any

period where normal operations are unattainable.

Answer option B is incorrect. A contingency plan is a plan devised for a specific situation when things could go wrong. Contingency plans are

often devised by governments or businesses who want to be prepared for anything that could happen. Contingency plans include specific

strategies and actions to deal with specific variances to assumptions resulting in a particular problem, emergency, or state of affairs. They also

include a monitoring process and 'triggers' for initiating planned actions. They are required to help governments, businesses, or individuals to

recover from serious incidents in the minimum time with minimum cost and disruption.


Question #3

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a

password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

Reveal Solution Hide Solution
Correct Answer: A

password to each application. In SSO, a user can access all computer applications and systems where he has access permission without

entering multiple passwords. This reduces human error and systems failure and is therefore highly desirable. There are many commercial SSO

solutions available in the market. Some of them are as follows:

Central Authentication Service (CAS)

The Dutch NREN

CoSign

Enterprise Single Sign-On (E-SSO)

Web Single Sign-On (Web SSO)

Security Assertion Markup Language (SAML)

Direct SSO

Shibboleth

Answer option B is incorrect. A one-time password (OTP) is a password only valid for a single login session or transaction. OTP avoids a

number of shortcomings that are associated with traditional passwords. The most important shortcoming that is addressed by OTP is that OTP

is not vulnerable to replay attacks. If a potential intruder manages to record an OTP that was already used to log into a service or to conduct

a transaction, he will not be able to abuse it since it will be no longer valid.

Answer option D is incorrect. Kerberos is a secure protocol that supports ticketing authentication. A ticket is granted in response to a client

computer authentication request by the Kerberos authentication server, if the request contains valid user credentials and a valid Service

Principal Name (SPN). The ticket is then used by the client computer to access network resources. To enable Kerberos authentication, the

client and server computers must have a trusted connection to the domain Key Distribution Center (KDC). The task of KDC is to distribute

shared secret keys to enable encryption.

Answer option C is incorrect. In the dynamic password authentication scheme, passwords are changed after a specified time or time interval.


Question #4

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Reveal Solution Hide Solution
Correct Answer: B, C, D

Halon

Soda acid

CO2

Answer option A is incorrect. Water is used to suppress paper and wood fires.


Question #5

Which of the following are the phases of the Certification and Accreditation (C&A) process?

Each correct answer represents a complete solution. Choose two.

Reveal Solution Hide Solution
Correct Answer: B, C

1.Initiation

2.Security Certification

3.Security Accreditation

4.Continuous Monitoring

The C&A activities can be applied to an information system at appropriate phases in the system development life cycle by selectively tailoring

the various tasks and subtasks.

Answer options D and A are incorrect. Auditing and detection are not phases of the Certification and Accreditation process.



Unlock all Information Systems Security Architecture Professional Exam Questions with Advanced Practice Test Features:
  • Select Question Types you want
  • Set your Desired Pass Percentage
  • Allocate Time (Hours : Minutes)
  • Create Multiple Practice tests with Limited Questions
  • Customer Support
Get Full Access Now

Save Cancel