Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ISC certification ISSAP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam ISSAP Premium Access

View all detail and faqs for the ISSAP exam


332 Students Passed

94% Average Score

92% Same Questions
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following attacks allows the bypassing of access control lists on servers or routers, and helps an attacker to hide? Each correct answer represents a complete solution. Choose two.

Options:

A.

DNS cache poisoning

B.

MAC spoofing

C.

IP spoofing attack

D.

DDoS attack

Questions # 2:

You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?

Options:

A.

Repeater

B.

Bridge

C.

Switch

D.

Router

Questions # 3:

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

Options:

A.

In person attack

B.

Third-party authorization attack

C.

Impersonation attack

D.

Important user posing attack

Questions # 4:

You work as a Security Manager for Tech Perfect Inc. The management tells you to implement a hashing method in the organization that can resist forgery and is not open to the man-in-the-middle attack. Which of the following methods will you use to accomplish the task?

Options:

A.

MD

B.

NTLM

C.

MAC

D.

SHA

Questions # 5:

Which of the following are used to suppress paper or wood fires? Each correct answer represents a complete solution. Choose two.

Options:

A.

Soda acid

B.

Kerosene

C.

Water

D.

CO2

Questions # 6:

Perfect World Inc., provides its sales managers access to the company's network from remote locations. The sales managers use laptops to connect to the network. For security purposes, the company's management wants the sales managers to log on to the network using smart cards over a remote connection. Which of the following authentication protocols should be used to accomplish this?

Options:

A.

Challenge Handshake Authentication Protocol (CHAP)

B.

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

C.

Open Shortest Path First (OSPF)

D.

Extensible Authentication Protocol (EAP)

Questions # 7:

Access control systems enable an authority to control access to areas and resources in a given physical facility or computer-based information system. Which of the following services provided by access control systems is used to determine what a subject can do?

Options:

A.

Authentication

B.

Authorization

C.

Accountability

D.

Identification

Questions # 8:

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Options:

A.

Access control entry (ACE)

B.

Discretionary access control entry (DACE)

C.

Access control list (ACL)

D.

Security Identifier (SID)

Questions # 9:

Which of the following is a network service that stores and organizes information about a network users and network resources and that allows administrators to manage users' access to the resources?

Options:

A.

SMTP service

B.

Terminal service

C.

Directory service

D.

DFS service

Questions # 10:

Fill in the blank with the appropriate security method. ____________ is a system, which enables an authority to control access to areas and resources in a given physical facility, or computer- based information system.

Options:

A.

Access control

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.