Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions
Questions # 51:

You work as a Project Manager for Tech Perfect Inc. You are creating a document which emphasizes the formal study of what your organization is doing currently and where it will be in the future. Which of the following analysis will help you in accomplishing the task?

Options:

A.

Cost-benefit analysis


B.

Gap analysis


C.

Requirement analysis


D.

Vulnerability analysis


Expert Solution
Questions # 52:

Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?

Options:

A.

PPP


B.

X.25


C.

Frame relay


D.

SLIP


Expert Solution
Questions # 53:

Which of the following security devices is presented to indicate some feat of service, a special accomplishment, a symbol of authority granted by taking an oath, a sign of legitimate employment or student status, or as a simple means of identification?

Options:

A.

Sensor


B.

Alarm


C.

Motion detector


D.

Badge


Expert Solution
Questions # 54:

Which of the following is an electrical event shows that there is enough power on the grid to prevent from a total power loss but there is no enough power to meet the current electrical demand?

Options:

A.

Power Surge


B.

Power Spike


C.

Blackout


D.

Brownout


Expert Solution
Questions # 55:

Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options:

A.

Structured walk-through test


B.

Simulation test


C.

Full-interruption test


D.

Parallel test


Expert Solution
Questions # 56:

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Denial-of-Service attack


B.

Vulnerability attack


C.

Social Engineering attack


D.

Impersonation attack


Expert Solution
Questions # 57:

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Options:

A.

Biometric device


B.

One Time Password


C.

Proximity cards


D.

Security token


Expert Solution
Questions # 58:

Kerberos is a computer network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. Which of the following statements are true about the Kerberos authentication scheme? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Kerberos requires continuous availability of a central server.


B.

Dictionary and brute force attacks on the initial TGS response to a client may reveal the subject's passwords.


C.

Kerberos builds on Asymmetric key cryptography and requires a trusted third party.


D.

Kerberos requires the clocks of the involved hosts to be synchronized.


Expert Solution
Questions # 59:

In which of the following alternative processing sites is the backup facility maintained in a constant order, with a full complement of servers, workstations, and communication links ready to assume the primary operations responsibility? A. Hot Site B. Mobile Site C. Warm Site D. Cold Site


Expert Solution
Questions # 60:

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using public key infrastructure authentication.


B.

Using basic authentication.


C.

Using Secret keys for authentication.


D.

Using Off-channel verification.


Expert Solution
Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions