Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC ISSAP - ISSAP Information Systems Security Architecture Professional

Page: 7 / 8
Total 237 questions

Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

A.

Man trap

B.

Biometric device

C.

Host Intrusion Detection System (HIDS)

D.

Network Intrusion Detection System (NIDS)

You are the Network Administrator for a small business. You need a widely used, but highly secure hashing algorithm. Which of the following should you choose?

A.

AES

B.

SHA

C.

EAP

D.

CRC32

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

A.

RBAC

B.

MAC

C.

CIA

D.

DAC

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?

A.

Project gap

B.

Product gap

C.

Competitive gap

D.

Usage gap

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

A.

Cipher feedback mode

B.

Cipher block chaining mode

C.

Output feedback mode

D.

Electronic codebook mode

Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.

A.

Public key

B.

IPsec

C.

MS-CHAP

D.

Symmetric

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.

A.

Public-key cryptography

B.

Kerberos

C.

Preshared keys

D.

Digital certificates