Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CISSP-ISSAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 9

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

A.

It is the fastest method of backing up data.

B.

It is the slowest method for taking a data backup.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Full Access
Question # 10

Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?

A.

Asymmetric encryption

B.

Symmetric encryption

C.

S/MIME

D.

PGP

Full Access
Question # 11

Fill in the blank with the appropriate security device. ___________ is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view.

A.

Motion detector

Full Access
Question # 12

Which of the following statements about Discretionary Access Control List (DACL) is true?

A.

It specifies whether an audit activity should be performed when an object attempts to access a resource.

B.

It is a unique number that identifies a user, group, and computer account.

C.

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

D.

It is a rule list containing access control entries.

Full Access
Question # 13

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

A.

Detective access control

B.

Corrective access control

C.

Administrative access control

D.

Preventive access control

Full Access
Question # 14

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Full Access
Question # 15

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

A.

Social Engineering attack

B.

Brute Force attack

C.

War dialing attack

D.

Replay attack

Full Access
Question # 16

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

A.

Estimate the potential losses to assets by determining their value.

B.

Establish the threats likelihood and regularity.

C.

Valuations of the critical assets in hard costs.

D.

Evaluate potential threats to the assets.

Full Access
Go to page: