ISC ISSAP - ISSAP Information Systems Security Architecture Professional
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?
You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?
Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?
Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?
Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.