Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC ISSAP - ISSAP Information Systems Security Architecture Professional

Page: 2 / 8
Total 237 questions

Which of the following heights of fence deters only casual trespassers?

A.

8 feet

B.

3 to 4 feet

C.

2 to 2.5 feet

D.

6 to 7 feet

Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.

A.

Executive summary

Which of the following processes identifies the threats that can impact the business continuity of operations?

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Which of the following is the most secure method of authentication?

A.

Smart card

B.

Anonymous

C.

Username and password

D.

Biometrics

Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.

A.

RADIUS

B.

TACACS+

C.

Media Access control

D.

Peer-to-Peer

You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access. You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read, write, or alter) for his product. Which of the following access control models will you use to accomplish this task?

A.

Discretionary access control (DAC)

B.

Role-based access control (RBAC)

C.

Mandatory access control (MAC)

D.

Access control list (ACL)

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

A.

Block cipher

B.

Stream cipher

C.

Transposition cipher

D.

Message Authentication Code

Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.

A.

Ethernet (IEEE 802.3)

B.

Token ring (IEEE 802.5)

C.

Fiber Distributed Data Interface (FDDI)

D.

Wireless LAN (IEEE 802.11b)

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

A.

The use of CHAP.

B.

Time of day restrictions.

C.

The use of smart cards.

D.

Video surveillance of all computers.

Which of the following cables provides maximum security against electronic eavesdropping on a network?

A.

Fibre optic cable

B.

STP cable

C.

UTP cable

D.

NTP cable