Create Quiz

CISSP - ISSAP Information Systems Security Architecture Professional Quiz

CISSP - ISSAP Information Systems Security Architecture Professional Quiz

CISSP - ISSAP Information Systems Security Architecture Professional Quiz Test. The Information Systems Security Architecture Professional (ISSAP) is a CISSP who specializes in designing security solutions and providing management with risk-based guidance to meet organizational goals.

You can mute/unmute sounds from here

You May Get Result Of CISSP - ISSAP Information Systems Security Architecture Professional Quiz

Fail
B
A
A+
POST YOUR ANSWER (READ ANSWERS)

Quiz Questions And Answers

Which of the following component of ITIL’s service portfolio is primarily focused on translating designs into operational services through a standard project management standard?

Service strategy
Service design
Service transition
Service operations

Without proper definition of security requirements, systems fail. Which of the following can be used to capture detailed security requirements?

Threat modeling
Data classification
Risk assessments
All of the above

Which of the following describes the rules that need to be implemented to ensure that the security requirements are met?

Security kernel
Security policy
Security model
Security reference monitor

A two dimensional grouping of individual subjects into groups or roles and granting access to groups to objects is an example of which of the following types of models?

Multilevel lattice
State machine
Noninterference
Matrix-based

Which of the following is unique to the Biba integrity model?

Simple property
* (star) property
Invocation property
Strong * property

Which of the following models must be most considered in a shared data hosting environment so that the data of one customer is not disclosed a competitor or other customers sharing

Brewer–Nash
Clark–Wilson
Bell–LaPadula
Lipner

Which of the following is the security model that is primarily concerned with how the subjects and objects are created and how subjects are assigned rights or privileges?

Bell–LaPadula
Biba
Chinese Wall
Graham–Denning

Which of the following ISO standard provides the evaluation criteria that can be used to evaluate security requirements of diff erent vendor products?

15408
27000
TCSEC
ITSEC

In the Common Criteria, the common set of functional and assurance requirements for a category of vendor products deployed in a particular type of environment is known as

Protection profiles
Security target
Trusted computing Base
Ring protection

Which of the following evaluation assurance level that is formally verified, designed, and tested is expected for high risk situation?

EAL 1
EAL 3
EAL 5
EAL 7
ANSWERS

Currently, we have no comments. Be first to comment on this quiz.

CISSP - ISSAP Information Systems Security Architecture Professional Quiz : Test Trivia

Ultimate impossible accurate personality honest Quiz Game

Embed This Quiz
Copy the code below to embed this quiz