Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC ISSAP - ISSAP Information Systems Security Architecture Professional

Page: 6 / 8
Total 237 questions

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

A.

Storage Area network

B.

Off-site storage

C.

On-site storage

D.

Network attached storage

In which of the following network topologies does the data travel around a loop in a single direction and pass through each device?

A.

Ring topology

B.

Tree topology

C.

Star topology

D.

Mesh topology

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

A.

Power Surge

B.

Power Spike

C.

Blackout

D.

Brownout

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A.

Ensure that the plan works properly

B.

Ensure that all the servers in the organization are shut down.

C.

Ensure that each member of the disaster recovery team is aware of their responsibility.

D.

Ensure that all client computers in the organization are shut down.

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

A.

Risk analysis

B.

OODA loop

C.

Cryptography

D.

Firewall security

Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?

A.

RSTP

B.

SKIP

C.

OCSP

D.

HTTP

Which of the following statements best describes a certification authority?

A.

A certification authority is a technique to authenticate digital documents by using computer cryptography.

B.

A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.

C.

A certification authority is an entity that issues digital certificates for use by other parties.

D.

A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

A.

Integrity

B.

Confidentiality

C.

Authentication

D.

Non-repudiation

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?

A.

Star

B.

Mesh

C.

Bus

D.

Ring

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

A.

Biometric device

B.

One Time Password

C.

Proximity cards

D.

Security token