Breathing of CISSP-ISSAP practice question materials and torrent for ISC2 certification for consumer, Real Success Guaranteed with Updated CISSP-ISSAP pdf dumps vce Materials. 100% PASS Information Systems Security Architecture Professional exam Today!
Q25. Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?
A. Structured walk-through test
B. Simulation test
C. Full-interruption test
D. Parallel test
Answer: C
Q26. Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
A. RCO
B. RTO
C. RPO
D. RTA
Answer: B
Q27. Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two.
A. Public key
B. IPsec
C. MS-CHAP
D. Symmetric
Answer: A,D
Q28. SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.
A. Blowfish
B. DES
C. IDEA
D. RC4
Answer: A,B,C
Q29. Which of the following is the technology of indoor or automotive environmental comfort?
A. HIPS
B. HVAC
C. NIPS
D. CCTV
Answer: B
Q30. Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication?
A. Biometric device
B. One Time Password
C. Proximity cards
D. Security token
Answer: D
Q31. You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?
A. PGP
B. PPTP
C. IPSec
D. NTFS
Answer: A
Q32. Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two.
A. Data service
B. Ticket-granting service
C. Account service
D. Authentication service
Answer: B,D