Master the CISSP-ISSAP Information Systems Security Architecture Professional content and be ready for exam day success quickly with this Ucertify CISSP-ISSAP vce. We guarantee it!We make it a reality and give you real CISSP-ISSAP questions in our ISC2 CISSP-ISSAP braindumps.Latest 100% VALID ISC2 CISSP-ISSAP Exam Questions Dumps at below page. You can use our ISC2 CISSP-ISSAP braindumps and pass your exam.
Q1. You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?
A. Containment
B. Preparation
C. Recovery
D. Identification
Answer: A
Q2. You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
A. Eradication
B. Identification
C. Recovery
D. Containment
Answer: A
Q3. You work as a technician for Trade Well Inc. The company is in the business of share trading. To enhance security, the company wants users to provide a third key (apart from ID and password) to access the company's Web site. Which of the following technologies will you implement to accomplish the task?
A. Smart cards
B. Key fobs
C. VPN
D. Biometrics
Answer: B
Q4. A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
A. Denial-of-Service attack
B. Vulnerability attack
C. Social Engineering attack
D. Impersonation attack
Answer: A
Q5. Which of the following tenets does the CIA triad provide for which security practices are measured? Each correct answer represents a part of the solution. Choose all that apply.
A. Integrity
B. Accountability
C. Availability
D. Confidentiality
Answer: A,C,D
Q6. Which of the following are the examples of technical controls? Each correct answer represents a complete solution. Choose three.
A. Auditing
B. Network acchitecture
C. System access
D. Data backups
Answer: A,B,C
Q7. The IPSec protocol is configured in an organization's network in order to maintain a complete infrastructure for secured network communications. IPSec uses four components for this. Which of the following components reduces the size of data transmitted over congested network connections and increases the speed of such networks without losing data?
A. AH
B. ESP
C. IPcomp
D. IKE
Answer: C
Q8. Which of the following protocols is designed to efficiently handle high-speed data over wide area networks (WANs)?
A. PPP
B. X.25
C. Frame relay
D. SLIP
Answer: C