Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

Options:

A.

Data encrypted with the secret key can only be decrypted by another secret key.


B.

The secret key can encrypt a message, and anyone with the public key can decrypt it.


C.

The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.


D.

Data encrypted by the public key can only be decrypted by the secret key.


Expert Solution
Questions # 12:

You work as a Network Consultant. A company named Tech Perfect Inc. hires you for security reasons. The manager of the company tells you to establish connectivity between clients and servers of the network which prevents eavesdropping and tampering of data on the Internet. Which of the following will you configure on the network to perform the given task?

Options:

A.

WEP


B.

IPsec


C.

VPN


D.

SSL


Expert Solution
Questions # 13:

You work as a remote support technician. A user named Rick calls you for support. Rick wants to connect his LAN connection to the Internet. Which of the following devices will you suggest that he use?

Options:

A.

Hub


B.

Repeater


C.

Bridge


D.

Switch


E.

Router


Expert Solution
Questions # 14:

Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Block cipher


B.

Stream cipher


C.

Transposition cipher


D.

Message Authentication Code


Expert Solution
Questions # 15:

Which of the following methods will allow data to be sent on the Internet in a secure format?

Options:

A.

Serial Line Interface Protocol


B.

Point-to-Point Protocol


C.

Browsing


D.

Virtual Private Networks


Expert Solution
Questions # 16:

Which of the following describes the acceptable amount of data loss measured in time?

Options:

A.

Recovery Consistency Objective (RCO)


B.

Recovery Time Objective (RTO)


C.

Recovery Point Objective (RPO)


D.

Recovery Time Actual (RTA)


Expert Solution
Questions # 17:

Which of the following protocols work at the Network layer of the OSI model?

Options:

A.

Routing Information Protocol (RIP)


B.

File Transfer Protocol (FTP)


C.

Simple Network Management Protocol (SNMP)


D.

Internet Group Management Protocol (IGMP)


Expert Solution
Questions # 18:

Which of the following components come under the network layer of the OSI model? Each correct answer represents a complete solution. Choose two.

Options:

A.

Routers


B.

MAC addresses


C.

Firewalls


D.

Hub


Expert Solution
Questions # 19:

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. Which of the following components does the PKI use to list those certificates that have been revoked or are no longer valid?

Options:

A.

Certification Practice Statement


B.

Certificate Policy


C.

Certificate Revocation List


D.

Certification Authority


Expert Solution
Questions # 20:

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.

Options:

A.

Soda acid


B.

Kerosene


C.

Water


D.

CO2


Expert Solution
Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions