Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 3 out of 8 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following schemes is used by the Kerberos authentication?

Options:

A.

Public key cryptography


B.

One time password


C.

Private key cryptography


D.

OPIE


Expert Solution
Questions # 22:

You are responsible for security at a building that has a lot of traffic. There are even a significant number of non-employees coming in and out of the building. You are concerned about being able to find out who is in the building at a particular time. What is the simplest way to accomplish this?

Options:

A.

Implement a sign in sheet at the main entrance and route all traffic through there.


B.

Have all people entering the building use smart cards for access.


C.

Implement biometric access.


D.

Implement cameras at all entrances.


Expert Solution
Questions # 23:

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

Options:

A.

Chosen ciphertext attack


B.

Known plaintext attack


C.

Chosen plaintext attack


D.

Ciphertext only attack


Expert Solution
Questions # 24:

Which of the following backup types backs up files that have been added and all data that have been modified since the most recent backup was performed?

Options:

A.

Differential backup


B.

Incremental backup


C.

Daily backup


D.

Full backup


Expert Solution
Questions # 25:

Which of the following keys are included in a certificate revocation list (CRL) of a public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.

Options:

A.

A foreign key


B.

A private key


C.

A public key


D.

A primary key


Expert Solution
Questions # 26:

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

Options:

A.

Parallel test


B.

Simulation test


C.

Full-interruption test


D.

Checklist test


Expert Solution
Questions # 27:

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the browser 's address bar, you are able to access the site. But, you are unable to access the site when you enter http://www.company.com. What is the most likely cause?

Options:

A.

The site's Web server is offline.


B.

The site's Web server has heavy traffic.


C.

WINS server has no NetBIOS name entry for the server.


D.

DNS entry is not available for the host name.


Expert Solution
Questions # 28:

You work as a Network Administrator for company Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

Options:

A.

Stateful firewall


B.

Endian firewall


C.

Packet filter firewall


D.

Proxy-based firewall


Expert Solution
Questions # 29:

You are responsible for security at a hospital. Since many computers are accessed by multiple employees 24 hours a day, 7 days a week, controlling physical access to computers is very difficult. This is compounded by a high number of non employees moving through the building. You are concerned about unauthorized access to patient records. What would best solve this problem?

Options:

A.

The use of CHAP.


B.

Time of day restrictions.


C.

The use of smart cards.


D.

Video surveillance of all computers.


Expert Solution
Questions # 30:

Which of the following types of ciphers are included in the historical ciphers? Each correct answer represents a complete solution. Choose two.

Options:

A.

Block ciphers


B.

Transposition ciphers


C.

Stream ciphers


D.

Substitution ciphers


Expert Solution
Viewing page 3 out of 8 pages
Viewing questions 21-30 out of questions