Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC ISSAP - ISSAP Information Systems Security Architecture Professional

Page: 1 / 8
Total 237 questions

Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?

A.

Single Sign-On

B.

One-time password

C.

Dynamic

D.

Kerberos

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

A.

SMTP service

B.

Terminal service

C.

Directory service

D.

DFS service

Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.

A.

ISDN

B.

X.25

C.

Frame Relay

D.

Leased line

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?

A.

Certification Practice Statement

B.

Certificate Policy

C.

Certificate Revocation List

D.

Certification Authority

Fill in the blank with the appropriate encryption system. The ______ encryption system is an asymmetric key encryption algorithm for the public-key cryptography, which is based on the Diffie- Hellman key agreement.

A.

ElGamal

You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?

A.

Photoelectric motion detector

B.

Badge

C.

Closed-circuit television

D.

Alarm

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

A.

Stateful firewall

B.

Endian firewall

C.

Packet filter firewall

D.

Proxy-based firewall

Which of the following layers of the OSI model provides non-repudiation services?

A.

The application layer

B.

The data-link layer

C.

The presentation layer

D.

The physical layer

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

A.

Risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Risk mitigation

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

A.

Twofish

B.

Digital certificates

C.

Public key

D.

RSA