PrepAway - Latest Free Exam Questions & Answers

Category: CISSP-ISSAP (v.1)

Exam CISSP-ISSAP: ISSAP Information Systems Security Architecture Professional (updat February, 19th 2015)

Which of the following cryptographic algorithms is being used by the Weare-secure server?

John works as a professional Ethical Hacker. He has been assigned the project of testing the security
of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-inthe-middle attack since the key exchange process of the cryptographic algorithm it is using does not
thenticate participants. Which of the following cryptographic algorithms is being used by the Weare-secure server?

Which of the following phases of the Incident handling process should you follow next to handle this incident?

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked
to your internal enterprise network. Which of the following phases of the Incident handling process
should you follow next to handle this incident?

Which of the following locations must have a camera in order to provide the minimum level of security for the

You have decided to implement video surveillance in your company in order to enhance network
security. Which of the following locations must have a camera in order to provide the minimum level
of security for the network resources? Each correct answer represents a complete solution. Choose
two.


Page 4 of 25« First...23456...1020...Last »