Sale!

ISSAP Information Systems Security Architecture Professional

$19.95

  • Passing Score: 800
  • Time Limit: 120 min
  • File Version: 4.0
  • Q&A: 237
  • Updated December 2022
Categories: ,
Recommend this page

Description

Exam Demo

ISSAP Information Systems Security Architecture Professional

QUESTION 1
Which of the following elements of the planning gap measures the gap between the total potential for the market and the actual current usage by all the
consumers in the market?
A. Project gap
B. Product gap
C. Competitive gap
D. Usage gap

Correct Answer: D

QUESTION 2
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
A. Hacking
B. Packet filtering
C. Web caching
D. Spoofing

Correct Answer: B

QUESTION 3
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish
this?
A. PGP
B. PPTP
C. IPSec
D. NTFS

Correct Answer: A

QUESTION 4
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through
a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent
through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will
Peter use to accomplish the task?
A. IP Security (IPSec)
B. Microsoft Point-to-Point Encryption (MPPE)
C. Pretty Good Privacy (PGP)
D. Data Encryption Standard (DES)

Correct Answer: A

QUESTION 5
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
A. ARP
B. ICMP
C. TCP
D. IGMP

Correct Answer: D

0/5 (0 Reviews)