Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CISSP-ISSAP Exam Results

Page: 3 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 9

In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?

Options:

A.

Discretionary Access Control (DAC)

B.

Role Based Access Control (RBAC)

C.

Mandatory Access Control (MAC)

D.

Access Control List (ACL)

Question 10

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack

B.

Cross site scripting attack

C.

Mail bombing

D.

Password guessing attack

Question 11

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

Options:

A.

CHAP

B.

PEAP

C.

EAP

D.

EAP-TLS

Question 12

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?

Options:

A.

Eradication

B.

Identification

C.

Recovery

D.

Containment

Page: 3 / 9
Total 237 questions