Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Ace the ISC ISSAP Exam: Ultimate Preparation Guide

Questions 21

The OSI model is the most common networking model used in the industry. Applications, network functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the following, choose the two best statements that describe the OSI layer functions. Each correct answer represents a complete solution. Choose two.

Options:

A.

Layers 1 and 2 deal with application functionality and data formatting. These layers reside at the top of the model.

B.

Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link protocols.

C.

Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and session control.

D.

Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error Recovery. These layers define the end-to-end functions of data delivery.

Buy Now
Questions 22

Which of the following describes the acceptable amount of data loss measured in time?

Options:

A.

Recovery Consistency Objective (RCO)

B.

Recovery Time Objective (RTO)

C.

Recovery Point Objective (RPO)

D.

Recovery Time Actual (RTA)

Buy Now
Questions 23

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

Options:

A.

Routers

B.

MAC addresses

C.

Firewalls

D.

Hub

Buy Now
Questions 24

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

Options:

A.

Access control

Buy Now
Questions 25

Which of the following methods will allow data to be sent on the Internet in a secure format?

Options:

A.

Serial Line Interface Protocol

B.

Point-to-Point Protocol

C.

Browsing

D.

Virtual Private Networks

Buy Now
Questions 26

Which of the following is the technology of indoor or automotive environmental comfort?

Options:

A.

HIPS

B.

HVAC

C.

NIPS

D.

CCTV

Buy Now
Questions 27

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Options:

A.

Stateful firewall

B.

Host-based application firewall

C.

A network-based application layer firewall

D.

An application firewall

Buy Now
Questions 28

Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?

Options:

A.

IPSec

B.

SET

C.

SWIPE

D.

SKIP

Buy Now
Questions 29

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?

Options:

A.

It represents how many times per year a specific threat occurs.

B.

It represents the percentage of loss that an asset experiences if an anticipated threat occurs.

C.

It is expected loss for an asset due to a risk over a one year period.

D.

It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

Buy Now
Questions 30

Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's headquarter and its regional offices using a WAN technology. For this, he uses packet-switched connection. Which of the following WAN technologies will Mark use to connect the offices? Each correct answer represents a complete solution. Choose two.

Options:

A.

ISDN

B.

X.25

C.

Frame Relay

D.

Leased line

Buy Now