Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Go to page:
Question # 4

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Full Access
Question # 5

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Full Access
Question # 6

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

A.

ARP

B.

ICMP

C.

TCP

D.

IGMP

Full Access
Question # 7

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

A.

Public-key cryptography

B.

Kerberos

C.

Preshared keys

D.

Digital certificates

Full Access
Question # 8

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Full Access
Go to page: