Cause all that matters here is passing the ISC2 CISSP-ISSAP exam. Cause all that you need is a high score of CISSP-ISSAP Information Systems Security Architecture Professional exam. The only one thing you need to do is downloading Pass4sure CISSP-ISSAP exam study guides now. We will not let you down with our money-back guarantee.

Q9. The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery? 

A. Key card 

B. Biometric devices 

C. Intrusion detection systems 

D. CCTV Cameras 

Answer:


Q10. Which of the following protocols multicasts messages and information among all member devices in an IP multicast group? 

A. ARP 

B. ICMP 

C. TCP 

D. IGMP 

Answer:


Q11. Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will she use to fulfill this requirement? 

A. IDEA 

B. PGP 

C. DES 

D. AES 

Answer:


Q12. Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)? 

A. IPSec 

B. L2TP 

C. LEAP 

D. ISAKMP 

Answer:


Q13. IPsec VPN provides a high degree of data privacy by establishing trust points between communicating devices and data encryption. Which of the following encryption methods does IPsec VPN use? Each correct answer represents a complete solution. Choose two. 

A. MD5 

B. LEAP 

C. AES 

D. 3DES 

Answer: C,D 


Q14. In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply. 

A. Public-key cryptography 

B. Kerberos 

C. Preshared keys 

D. Digital certificates 

Answer: B,C,D 


Q15. Which of the following are the countermeasures against a man-in-the-middle attack? Each correct answer represents a complete solution. Choose all that apply. 

A. Using public key infrastructure authentication. 

B. Using basic authentication. 

C. Using Secret keys for authentication. 

D. Using Off-channel verification. 

Answer: A,C,D 


Q16. Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task? 

A. IP Security (IPSec) 

B. Microsoft Point-to-Point Encryption (MPPE) 

C. Pretty Good Privacy (PGP) 

D. Data Encryption Standard (DES) 

Answer: