Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Ace the ISC ISSAP Exam: Ultimate Preparation Guide

Questions 61

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Options:

A.

Sensor

B.

Alarm

C.

Motion detector

D.

Badge

Buy Now
Questions 62

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:

A.

Buffer-overflow attack

B.

Man-in-the-middle attack

C.

Shoulder surfing attack

D.

Denial-of-Service (DoS) attack

Buy Now
Questions 63

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Options:

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Buy Now
Questions 64

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Buy Now
Questions 65

The network you administer allows owners of objects to manage the access to those objects via access control lists. This is an example of what type of access control?

Options:

A.

RBAC

B.

MAC

C.

CIA

D.

DAC

Buy Now
Questions 66

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

Options:

A.

Blowfish

B.

Twofish

C.

RSA

D.

Diffie-Hellman

Buy Now
Questions 67

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Options:

A.

Network-based

B.

Anomaly-based

C.

File-based

D.

Signature-based

Buy Now
Questions 68

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It uses symmetric key pairs.

B.

It provides security using data encryption and digital signature.

C.

It uses asymmetric key pairs.

D.

It is a digital representation of information that identifies users.

Buy Now
Questions 69

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Buy Now
Questions 70

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

Options:

A.

Hacking

B.

Packet filtering

C.

Web caching

D.

Spoofing

Buy Now