Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following methods of encryption uses a single key to encrypt and decrypt data?

Options:

A.

Asymmetric


B.

Symmetric


C.

S/MIME


D.

PGP


Expert Solution
Questions # 2:

Fill in the blank with the appropriate phrase. The is a simple document that provides a high-level view of the entire organization's disaster recovery efforts.

Options:

A.

Executive summary


Expert Solution
Questions # 3:

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

Options:

A.

Access control


Expert Solution
Questions # 4:

Which of the following layers of the OSI model provides non-repudiation services?

Options:

A.

The application layer


B.

The data-link layer


C.

The presentation layer


D.

The physical layer


Expert Solution
Questions # 5:

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in company's server using a port scanner. However, he does not want to establish a full TCP connection. Which of the following scanning techniques will he use to accomplish this task?

Options:

A.

TCP FIN


B.

Xmas tree


C.

TCP SYN/ACK


D.

TCP SYN


Expert Solution
Questions # 6:

Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.

Options:

A.

Water


B.

CO2


C.

Halon


D.

Soda acid


Expert Solution
Questions # 7:

Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?

Options:

A.

Disaster recovery plan


B.

Contingency plan


C.

Business Continuity plan


D.

Continuity of Operations plan


Expert Solution
Questions # 8:

Which of the following authentication methods support mutual authentication? Each correct answer represents a complete solution. Choose two.

Options:

A.

MS-CHAP v2


B.

NTLM


C.

EAP-MD5


D.

EAP-TLS


Expert Solution
Questions # 9:

Which of the following encryption methods comes under symmetric encryption algorithm? Each correct answer represents a complete solution. Choose three.

Options:

A.

DES


B.

Blowfish


C.

RC5


D.

Diffie-Hellman


Expert Solution
Questions # 10:

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

Options:

A.

Warm site


B.

Cold site


C.

Off site


D.

Hot site


Expert Solution
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions