Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 17

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

A.

Detective access control

B.

Physical access control

C.

Technical access control

D.

Administrative access control

Full Access
Question # 18

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

A.

SWIPE

B.

S/MIME

C.

SKIP

D.

SLIP

Full Access
Question # 19

Which of the following is used to authenticate asymmetric keys?

A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

Full Access
Question # 20

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

A.

Halon-f

B.

Halon 1301

C.

Halon 11

D.

Halon 1211

Full Access
Question # 21

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Full Access
Question # 22

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Full Access
Question # 23

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Full Access
Question # 24

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Full Access
Go to page: