Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pass CISSP-ISSAP Exam Guide

Page: 5 / 9
Total 237 questions

ISSAP Information Systems Security Architecture Professional Questions and Answers

Question 17

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blowfish

B.

DES

C.

IDEA

D.

RC4

Question 18

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)

B.

VPN

C.

FTP server

D.

Certificate server

Question 19

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?

Options:

A.

Asymmetric

B.

Hashing

C.

Numeric

D.

Symmetric

Question 20

You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

Options:

A.

BitLocker

B.

Smart Cards

C.

Service Accounts

D.

AppLocker

Page: 5 / 9
Total 237 questions