Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CISSP-ISSAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CISSP-ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 17

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Full Access
Question # 18

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Full Access
Question # 19

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

A.

GTC

B.

MS-CHAP v2

C.

AES

D.

RC4

Full Access
Question # 20

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Full Access
Question # 21

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.

A.

Kerberos requires continuous availability of a central server.

B.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.

C.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

D.

Kerberos requires the clocks of the involved hosts to be synchronized.

Full Access
Question # 22

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Full Access
Question # 23

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Full Access
Question # 24

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

Full Access
Go to page: