Pass the ISC ISC certification ISSAP Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following types of attacks cannot be prevented by technical measures only?

Options:

A.

Social engineering


B.

Brute force


C.

Smurf DoS


D.

Ping flood attack


Expert Solution
Questions # 62:

Which of the following statements about incremental backup are true? Each correct answer represents a complete solution. Choose two.

Options:

A.

It is the fastest method of backing up data.


B.

It is the slowest method for taking a data backup.


C.

It backs up the entire database, including the transaction log.


D.

It backs up only the files changed since the most recent backup and clears the archive bit.


Expert Solution
Questions # 63:

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.

Options:

A.

GTC


B.

MS-CHAP v2


C.

AES


D.

RC4


Expert Solution
Questions # 64:

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

Options:

A.

Synchronous


B.

Secret


C.

Asymmetric


D.

Symmetric


Expert Solution
Questions # 65:

A helpdesk technician received a phone call from an administrator at a remote branch office. The administrator claimed to have forgotten the password for the root account on UNIX servers and asked for it. Although the technician didn't know any administrator at the branch office, the guy sounded really friendly and since he knew the root password himself, he supplied the caller with the password. What type of attack has just occurred?

Options:

A.

Social Engineering attack


B.

Brute Force attack


C.

War dialing attack


D.

Replay attack


Expert Solution
Questions # 66:

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

Options:

A.

Policy Access Control


B.

Mandatory Access Control


C.

Discretionary Access Control


D.

Role-Based Access Control


Expert Solution
Questions # 67:

Which of the following refers to a location away from the computer center where document copies and backup media are kept?

Options:

A.

Storage Area network


B.

Off-site storage


C.

On-site storage


D.

Network attached storage


Expert Solution
Questions # 68:

You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?

Options:

A.

L2TP


B.

HTTPS


C.

SSL


D.

IPSec


Expert Solution
Questions # 69:

You are the Network Administrator for a college. You watch a large number of people (some not even students) going in and out of areas with campus computers (libraries, computer labs, etc.). You have had a problem with laptops being stolen. What is the most cost effective method to prevent this?

Options:

A.

Smart card access to all areas with computers.


B.

Use laptop locks.


C.

Video surveillance on all areas with computers.


D.

Appoint a security guard.


Expert Solution
Questions # 70:

You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?

Options:

A.

Microsoft Internet Information Server (IIS)


B.

VPN


C.

FTP server


D.

Certificate server


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions