New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Ace Your ISSAP ISC certification Exam

Page: 6 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 21

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

Options:

A.

Synchronous

B.

Secret

C.

Asymmetric

D.

Symmetric

Question 22

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the fastest method of backing up data.

B.

It is the slowest method for taking a data backup.

C.

It backs up the entire database, including the transaction log.

D.

It backs up only the files changed since the most recent backup and clears the archive bit.

Question 23

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement?

Options:

A.

IDEA

B.

PGP

C.

DES

D.

AES

Question 24

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography

Page: 6 / 9
Total 237 questions