Breathing of CISSP-ISSAP practice question materials and torrent for ISC2 certification for consumer, Real Success Guaranteed with Updated CISSP-ISSAP pdf dumps vce Materials. 100% PASS Information Systems Security Architecture Professional exam Today!

Q25. Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan? 

A. Structured walk-through test 

B. Simulation test 

C. Full-interruption test 

D. Parallel test 

Answer:


Q26. Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity? 

A. RCO 

B. RTO 

C. RPO 

D. RTA 

Answer:


Q27. Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. Choose two. 

A. Public key 

B. IPsec 

C. MS-CHAP 

D. Symmetric 

Answer: A,D 


Q28. SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply. 

A. Blowfish 

B. DES 

C. IDEA 

D. RC4 

Answer: A,B,C 


Q29. Which of the following is the technology of indoor or automotive environmental comfort? 

A. HIPS 

B. HVAC 

C. NIPS 

D. CCTV 

Answer:


Q30. Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective. Which of the following types of hardware devices will Adam use to implement two-factor authentication? 

A. Biometric device 

B. One Time Password 

C. Proximity cards 

D. Security token 

Answer:


Q31. You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this? 

A. PGP 

B. PPTP 

C. IPSec 

D. NTFS 

Answer:


Q32. Which of the following two components does Kerberos Key Distribution Center (KDC) consist of? Each correct answer represents a complete solution. Choose two. 

A. Data service 

B. Ticket-granting service 

C. Account service 

D. Authentication service 

Answer: B,D