New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC certification ISSAP Release Date

Page: 8 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 29

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Options:

A.

SSH

B.

Telnet

C.

SCP

D.

SSL

Question 30

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

Options:

A.

CHAP

B.

PEAP

C.

EAP

D.

EAP-TLS

Question 31

A network is configured on a Bus topology. Which of the following conditions could cause a network failure? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A break in a network cable

B.

75 ohm terminators at open ends

C.

A powered off workstation

D.

An open-ended cable without terminators

Question 32

Which of the following are the primary components of a discretionary access control (DAC) model? Each correct answer represents a complete solution. Choose two.

Options:

A.

User's group

B.

File and data ownership

C.

Smart card

D.

Access rights and permissions

Page: 8 / 9
Total 237 questions