Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 9

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Full Access
Question # 10

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

A.

Data service

B.

Ticket-granting service

C.

Account service

D.

Authentication service

Full Access
Question # 11

Which of the following attacks can be overcome by applying cryptography?

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

Full Access
Question # 12

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

A.

Synchronous

B.

Secret

C.

Asymmetric

D.

Symmetric

Full Access
Question # 13

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

Full Access
Question # 14

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.

Ensure that the plan works properly

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that each member of the disaster recovery team is aware of their responsibility.

D.

Ensure that all client computers in the organization are shut down.

Full Access
Question # 15

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

A.

Not using laptops.

B.

Keeping all doors locked with a guard.

C.

Using a man-trap.

D.

A sign in log.

Full Access
Question # 16

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?

A.

Smart card

B.

USB device with cryptographic data

C.

CHAP

D.

Key fob

Full Access
Go to page: