Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISC CISSP-ISSAP Actual Questions

Page: 2 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 5

Which of the following are the initial steps required to perform a risk analysis process? Each correct answer represents a part of the solution. Choose three.

Options:

A.

Estimate the potential losses to assets by determining their value.

B.

Establish the threats likelihood and regularity.

C.

Valuations of the critical assets in hard costs.

D.

Evaluate potential threats to the assets.

Question 6

The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?

Options:

A.

AH

B.

ESP

C.

IPcomp

D.

IKE

Question 7

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Options:

A.

PPP

B.

X.25

C.

Frame relay

D.

SLIP

Question 8

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Options:

A.

Electronic vaulting

B.

Remote journaling

C.

Remote mirroring

D.

Transaction logging

Page: 2 / 9
Total 237 questions