Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISSAP Questions and Answers

Question # 6

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Full Access
Question # 7

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

A.

Smart card access to all areas with computers.

B.

Use laptop locks.

C.

Video surveillance on all areas with computers.

D.

Appoint a security guard.

Full Access
Question # 8

Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?

A.

RCO

B.

RTO

C.

RPO

D.

RTA

Full Access
Question # 9

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Full Access
Question # 10

Which of the following cryptographic system services ensures that information will not be disclosed to any unauthorized person on a local network?

A.

Authentication

B.

Non-repudiation

C.

Integrity

D.

Confidentiality

Full Access
Question # 11

The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.

A.

Disaster recovery planning

B.

SOA value proposition

C.

Software assets reuse

D.

Architectural components abstraction

E.

Business traceability

Full Access
Question # 12

Which of the following is an input device that is used for controlling machines such as cranes, trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning radius lawn mowers?

A.

PS/2

B.

Joystick

C.

Microphone

D.

AGP

Full Access
Question # 13

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

A.

Parking lot

B.

All hallways

C.

Server Rooms

D.

All offices

E.

All entrance doors

Full Access
Question # 14

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

A.

IDEA

B.

PGP

C.

DES

D.

AES

Full Access
Question # 15

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Full Access
Question # 16

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography

Full Access
Question # 17

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Full Access
Question # 18

Which of the following statements best describes a certification authority?

A.

A certification authority is a technique to authenticate digital documents by using computer cryptography.

B.

A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.

C.

A certification authority is an entity that issues digital certificates for use by other parties.

D.

A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.

Full Access
Question # 19

You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?

A.

Smart cards

B.

Key fobs

C.

VPN

D.

Biometrics

Full Access
Question # 20

Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a part of the solution. Choose three.

A.

Guarantee the reliability of standby systems through testing and simulation.

B.

Protect an organization from major computer services failure.

C.

Minimize the risk to the organization from delays in providing services.

D.

Maximize the decision-making required by personnel during a disaster.

Full Access
Question # 21

Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?

A.

Skipjack

B.

Blowfish

C.

AES

D.

IDEA

Full Access
Question # 22

In which of the following access control models, owner of an object decides who is allowed to access the object and what privileges they have?

A.

Access Control List (ACL)

B.

Mandatory Access Control (MAC)

C.

Role Based Access Control (RBAC)

D.

Discretionary Access Control (DAC)

Full Access
Question # 23

John works as a security manager for SoftTech Inc. He is working with his team on the disaster recovery management plan. One of his team members has a doubt related to the most cost effective DRP testing plan. According to you, which of the following disaster recovery testing plans is the most cost-effective and efficient way to identify areas of overlap in the plan before conducting more demanding training exercises?

A.

Evacuation drill

B.

Walk-through drill

C.

Structured walk-through test

D.

Full-scale exercise

Full Access
Question # 24

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?

A.

Connect a brouter to the network.

B.

Implement a proxy server on the network.

C.

Connect a router to the network.

D.

Implement firewall on the network.

Full Access
Question # 25

Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.

A.

Dictionary attack

B.

Mail bombing

C.

Spoofing

D.

Brute force attack

Full Access
Question # 26

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.

Stateful firewall

B.

Endian firewall

C.

Packet filter firewall

D.

Proxy-based firewall

Full Access
Question # 27

Which of the following protocols provides the highest level of VPN security with a VPN connection that uses the L2TP protocol?

A.

IPSec

B.

PPPoE

C.

PPP

D.

TFTP

Full Access
Question # 28

You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?

A.

Photoelectric motion detector

B.

Badge

C.

Closed-circuit television

D.

Alarm

Full Access
Question # 29

You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

A.

BitLocker

B.

Smart Cards

C.

Service Accounts

D.

AppLocker

Full Access
Question # 30

Which of the following uses public key cryptography to encrypt the contents of files?

A.

EFS

B.

DFS

C.

NTFS

D.

RFS

Full Access
Question # 31

Which of the following decides access control on an object in the mandatory access control (MAC) environment?

A.

Sensitivity label

B.

Event log

C.

System Access Control List (SACL)

D.

Security log

Full Access
Question # 32

Which of the following is the technology of indoor or automotive environmental comfort?

A.

HIPS

B.

HVAC

C.

NIPS

D.

CCTV

Full Access
Question # 33

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

A.

Eradication

B.

Identification

C.

Recovery

D.

Containment

Full Access
Question # 34

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Full Access
Question # 35

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?

A.

AES

B.

SHA

C.

MD5

D.

DES

Full Access