Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISSAP Exam Dumps - ISSAP Information Systems Security Architecture Professional

Question # 4

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Full Access
Question # 5

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Full Access
Question # 6

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

A.

ARP

B.

ICMP

C.

TCP

D.

IGMP

Full Access
Question # 7

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

A.

Public-key cryptography

B.

Kerberos

C.

Preshared keys

D.

Digital certificates

Full Access
Question # 8

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Full Access
Question # 9

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

A.

The Physical layer

B.

The Data-Link layer

C.

The Network layer

D.

The Presentation layer

Full Access
Question # 10

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.

A.

Data service

B.

Ticket-granting service

C.

Account service

D.

Authentication service

Full Access
Question # 11

Which of the following attacks can be overcome by applying cryptography?

A.

Web ripping

B.

DoS

C.

Sniffing

D.

Buffer overflow

Full Access
Question # 12

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

A.

Synchronous

B.

Secret

C.

Asymmetric

D.

Symmetric

Full Access
Question # 13

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

Full Access
Question # 14

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.

Ensure that the plan works properly

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that each member of the disaster recovery team is aware of their responsibility.

D.

Ensure that all client computers in the organization are shut down.

Full Access
Question # 15

You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data. They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?

A.

Not using laptops.

B.

Keeping all doors locked with a guard.

C.

Using a man-trap.

D.

A sign in log.

Full Access
Question # 16

You are the Network Administrator at a large company. Your company has a lot of contractors and other outside parties that come in and out of the building. For this reason you are concerned that simply having usernames and passwords is not enough and want to have employees use tokens for authentication. Which of the following is not an example of tokens?

A.

Smart card

B.

USB device with cryptographic data

C.

CHAP

D.

Key fob

Full Access
Question # 17

Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?

A.

Detective access control

B.

Physical access control

C.

Technical access control

D.

Administrative access control

Full Access
Question # 18

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

A.

SWIPE

B.

S/MIME

C.

SKIP

D.

SLIP

Full Access
Question # 19

Which of the following is used to authenticate asymmetric keys?

A.

Digital signature

B.

MAC Address

C.

Demilitarized zone (DMZ)

D.

Password

Full Access
Question # 20

Which of the following types of halon is found in portable extinguishers and is stored as a liquid?

A.

Halon-f

B.

Halon 1301

C.

Halon 11

D.

Halon 1211

Full Access
Question # 21

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Full Access
Question # 22

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Full Access
Question # 23

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

Full Access
Question # 24

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Full Access
Question # 25

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Connect a brouter to the network.

B.

Implement a proxy server on the network.

C.

Connect a router to the network.

D.

Implement firewall on the network.

Full Access
Question # 26

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Safeguard

B.

Annualized Rate of Occurrence (ARO)

C.

Single Loss Expectancy (SLE)

D.

Exposure Factor (EF)

Full Access
Question # 27

An access control secures the confidentiality, integrity, and availability of the information and data of an organization. In which of the following categories can you deploy the access control? Each correct answer represents a part of the solution. Choose all that apply.

A.

Detective access control

B.

Corrective access control

C.

Administrative access control

D.

Preventive access control

Full Access
Question # 28

Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution. Choose three.

A.

It hides the internal IP addressing scheme.

B.

It protects network from the password guessing attacks.

C.

It is used to connect private networks to the public Internet.

D.

It shares public Internet addresses with a large number of internal network clients.

Full Access
Question # 29

Which of the following is the most secure method of authentication?

A.

Smart card

B.

Anonymous

C.

Username and password

D.

Biometrics

Full Access
Question # 30

An organization has implemented a hierarchical-based concept of privilege management in which administrators have full access, HR managers have less permission than the administrators, and data entry operators have no access to resources. Which of the following access control models is implemented in the organization?

A.

Role-based access control (RBAC)

B.

Network-based access control (NBAC)

C.

Mandatory Access Control (MAC)

D.

Discretionary access control (DAC)

Full Access
Question # 31

Sonya, a user, reports that she works in an electrically unstable environment where brownouts are a regular occurrence. Which of the following will you tell her to use to protect her computer?

A.

UPS

B.

Multimeter

C.

SMPS

D.

CMOS battery

Full Access
Question # 32

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

Full Access
Question # 33

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

A.

WEP

B.

IPsec

C.

VPN

D.

SSL

Full Access
Question # 34

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

A.

Access control

Full Access
Question # 35

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Full Access