ISC ISSAP - ISSAP Information Systems Security Architecture Professional Exam

Page:    1 / 48   
Total 237 questions

Which of the following elements of planning gap measures the gap between the total potential for the market and the actual current usage by all the consumers in the market?

  • A. Project gap
  • B. Product gap
  • C. Competitive gap
  • D. Usage gap


Answer : D

Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?

  • A. Hacking
  • B. Packet filtering
  • C. Web caching
  • D. Spoofing


Answer : B

You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e- mails. Which of the following will you use to accomplish this?

  • A. PGP
  • B. PPTP
  • C. IPSec
  • D. NTFS


Answer : A

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will
Peter use to accomplish the task?

  • A. IP Security (IPSec)
  • B. Microsoft Point-to-Point Encryption (MPPE)
  • C. Pretty Good Privacy (PGP)
  • D. Data Encryption Standard (DES)


Answer : A

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

  • A. ARP
  • B. ICMP
  • C. TCP
  • D. IGMP


Answer : D

Page:    1 / 48   
Total 237 questions