Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 25

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Connect a brouter to the network.

B.

Implement a proxy server on the network.

C.

Connect a router to the network.

D.

Implement firewall on the network.

Full Access
Question # 26

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Safeguard

B.

Annualized Rate of Occurrence (ARO)

C.

Single Loss Expectancy (SLE)

D.

Exposure Factor (EF)

Full Access
Question # 27

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

A.

Detective access control

B.

Corrective access control

C.

Administrative access control

D.

Preventive access control

Full Access
Question # 28

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

Full Access
Question # 29

Which of the following is the most secure method of authentication?

A.

Smart card

B.

Anonymous

C.

Username and password

D.

Biometrics

Full Access
Question # 30

An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

A.

Role-based access control (RBAC)

B.

Network-based access control (NBAC)

C.

Mandatory Access Control (MAC)

D.

Discretionary access control (DAC)

Full Access
Question # 31

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

A.

UPS

B.

Multimeter

C.

SMPS

D.

CMOS battery

Full Access
Question # 32

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

Full Access
Go to page: