Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

Options:

A.

Domain Controller


B.

Certificate User


C.

Certification Authority


D.

Internet Authentication Server


Expert Solution
Questions # 32:

Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?

Options:

A.

Mark as final


B.

Digital Signature


C.

Restrict Permission


D.

Encrypt Document


Expert Solution
Questions # 33:

You work as a Chief Security Officer for Tech Perfect Inc. The company has an internal room without any window and is totally in darkness. For security reasons, you want to place a device in the room. Which of the following devices is best for that room?

Options:

A.

Photoelectric motion detector


B.

Badge


C.

Closed-circuit television


D.

Alarm


Expert Solution
Questions # 34:

Which of the following heights of fence deters only casual trespassers?

Options:

A.

8 feet


B.

3 to 4 feet


C.

2 to 2.5 feet


D.

6 to 7 feet


Expert Solution
Questions # 35:

You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.

Options:

A.

Reduce power consumption


B.

Ease of maintenance


C.

Failover


D.

Load balancing


Expert Solution
Questions # 36:

You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?

Options:

A.

BitLocker


B.

Smart Cards


C.

Service Accounts


D.

AppLocker


Expert Solution
Questions # 37:

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?

Options:

A.

IPSec


B.

L2TP


C.

LEAP


D.

ISAKMP


Expert Solution
Questions # 38:

You have decided to implement video surveillance in your company in order to enhance network security. Which of the following locations must have a camera in order to provide the minimum level of security for the network resources? Each correct answer represents a complete solution. Choose two.

Options:

A.

Parking lot


B.

All hallways


C.

Server Rooms


D.

All offices


E.

All entrance doors


Expert Solution
Questions # 39:

Which of the following is used to authenticate asymmetric keys?

Options:

A.

Digital signature


B.

MAC Address


C.

Demilitarized zone (DMZ)


D.

Password


Expert Solution
Questions # 40:

Which of the following protocols uses public-key cryptography to authenticate the remote computer?

Options:

A.

SSH


B.

Telnet


C.

SCP


D.

SSL


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions