Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions
Questions # 41:

A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

In order to digitally sign an electronic record, a person must use his/her public key.


B.

In order to verify a digital signature, the signer's private key must be used.


C.

In order to digitally sign an electronic record, a person must use his/her private key.


D.

In order to verify a digital signature, the signer's public key must be used.


Expert Solution
Questions # 42:

Which of the following processes is used to identify relationships between mission critical applications, processes, and operations and all supporting elements?

Options:

A.

Critical path analysis


B.

Functional analysis


C.

Risk analysis


D.

Business impact analysis


Expert Solution
Questions # 43:

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Web ripping


B.

DoS


C.

Sniffing


D.

Buffer overflow


Expert Solution
Questions # 44:

Which of the following statements about a stream cipher are true? Each correct answer represents a complete solution. Choose three.

Options:

A.

It typically executes at a higher speed than a block cipher.


B.

It divides a message into blocks for processing.


C.

It typically executes at a slower speed than a block cipher.


D.

It divides a message into bits for processing.


E.

It is a symmetric key cipher.


Expert Solution
Questions # 45:

Which of the following types of firewall functions at the Session layer of OSI model?

Options:

A.

Circuit-level firewall


B.

Application-level firewall


C.

Packet filtering firewall


D.

Switch-level firewall


Expert Solution
Questions # 46:

Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.

Options:

A.

Auditing


B.

Network acchitecture


C.

System access


D.

Data backups


Expert Solution
Questions # 47:

Which of the following statements best describes a certification authority?

Options:

A.

A certification authority is a technique to authenticate digital documents by using computer cryptography.


B.

A certification authority is a type of encryption that uses a public key and a private key pair for data encryption.


C.

A certification authority is an entity that issues digital certificates for use by other parties.


D.

A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.


Expert Solution
Questions # 48:

Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

Options:

A.

Risk analysis


B.

OODA loop


C.

Cryptography


D.

Firewall security


Expert Solution
Questions # 49:

An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?

Options:

A.

Electronic vaulting


B.

Remote journaling


C.

Remote mirroring


D.

Transaction logging


Expert Solution
Questions # 50:

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Options:

A.

Social engineering attack


B.

Cross site scripting attack


C.

Mail bombing


D.

Password guessing attack


Expert Solution
Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions