ISC ISSAP - ISSAP Information Systems Security Architecture Professional
Which of the following heights of fence deters only casual trespassers?
Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.
Which of the following processes identifies the threats that can impact the business continuity of operations?
Which of the following is the most secure method of authentication?
Which of the following are the centralized administration technologies? Each correct answer represents a complete solution. Choose all that apply.
You work as an administrator for Techraft Inc. Employees of your company create 'products', which are supposed to be given different levels of access. You need to configure a security policy in such a way that an employee (producer of the product) grants accessing privileges (such as read, write, or alter) for his product. Which of the following access control models will you use to accomplish this task?
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
Which of the following LAN protocols use token passing for exchanging signals among various stations on the network? Each correct answer represents a complete solution. Choose two.
You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?
Which of the following cables provides maximum security against electronic eavesdropping on a network?