Vcehome > ISC > ISC Certification > ISSAP > ISSAP Online Practice Questions and Answers

ISSAP Online Practice Questions and Answers

Questions 4

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

A. IP Security (IPSec)

B. Microsoft Point-to-Point Encryption (MPPE)

C. Pretty Good Privacy (PGP)

D. Data Encryption Standard (DES)

Browse 237 Q&As
Questions 5

Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A. Risk analysis

B. Firewall security

C. Cryptography

D. OODA loop

Browse 237 Q&As
Questions 6

You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the following networking devices will you use to accomplish the task?

A. Hub

B. Switch

C. Repeater

D. Router

Browse 237 Q&As
Questions 7

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

A. Blowfish

B. DES

C. IDEA

D. RC4

Browse 237 Q&As
Questions 8

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

A. It is the fastest method of backing up data.

B. It is the slowest method for taking a data backup.

C. It backs up the entire database, including the transaction log.

D. It backs up only the files changed since the most recent backup and clears the archive bit.

Browse 237 Q&As
Questions 9

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

A. SMTP service

B. Terminal service

C. Directory service

D. DFS service

Browse 237 Q&As
Questions 10

In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

A. Access Control List (ACL)

B. Mandatory Access Control (MAC)

C. Role Based Access Control (RBAC)

D. Discretionary Access Control (DAC)

Browse 237 Q&As
Questions 11

Which of the following is the process of finding weaknesses in cryptographic algorithms and obtaining the plaintext or key from the ciphertext?

A. Kerberos

B. Cryptography

C. Cryptographer

D. Cryptanalysis

Browse 237 Q&As
Questions 12

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

A. SWIPE

B. S/MIME

C. SKIP

D. SLIP

Browse 237 Q&As
Questions 13

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

A. Domain Controller

B. Certificate User

C. Certification Authority

D. Internet Authentication Server

Browse 237 Q&As
Exam Code: ISSAP
Exam Name: ISSAP Information Systems Security Architecture Professional
Last Update: Apr 18, 2024
Questions: 237 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99