Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

Ace the ISC ISSAP Exam: Ultimate Preparation Guide

Questions 11

Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Authenticity

B.

Globalization

C.

Mobility

D.

Integrity

E.

Confidentiality

F.

Nonrepudiation

Buy Now
Questions 12

Which of the following processes identifies the threats that can impact the business continuity of operations?

Options:

A.

Function analysis

B.

Risk analysis

C.

Business impact analysis

D.

Requirement analysis

Buy Now
Questions 13

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

Options:

A.

Firewall

B.

NAT

C.

MAC address

D.

IPSec

Buy Now
Questions 14

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Options:

A.

Implement a sign in sheet at the main entrance and route all traffic through there.

B.

Have all people entering the building use smart cards for access.

C.

Implement biometric access.

D.

Implement cameras at all entrances.

Buy Now
Questions 15

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

Options:

A.

The use of CHAP.

B.

Time of day restrictions.

C.

The use of smart cards.

D.

Video surveillance of all computers.

Buy Now
Questions 16

Which of the following uses a Key Distribution Center (KDC) to authenticate a principle?

Options:

A.

CHAP

B.

PAP

C.

Kerberos

D.

TACACS

Buy Now
Questions 17

Which of the following encryption algorithms is used by the Clipper chip, which supports the escrowed encryption standard?

Options:

A.

Skipjack

B.

Blowfish

C.

AES

D.

IDEA

Buy Now
Questions 18

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:

A.

Domain Controller

B.

Certificate User

C.

Certification Authority

D.

Internet Authentication Server

Buy Now
Questions 19

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

Options:

A.

PMK

B.

PTK

C.

PKI

D.

GTK

Buy Now
Questions 20

Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?

Options:

A.

PPTP

B.

SMTP

C.

HTTPS

D.

L2TP

Buy Now