Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC certification ISSAP Exam Dumps

Page: 3 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 9

Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?

Options:

A.

Pre-shared key authentication

B.

Open system authentication

C.

Shared key authentication

D.

Single key authentication

Question 10

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?

Options:

A.

Stateful firewall

B.

Host-based application firewall

C.

A network-based application layer firewall

D.

An application firewall

Question 11

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Warm site

B.

Cold site

C.

Off site

D.

Hot site

Question 12

You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?

Options:

A.

PGP

B.

SSH

C.

DES

D.

RC4

Page: 3 / 9
Total 237 questions